Volume-2 (The National Symposium on Antenna Signal Processing & Interdisciplinary Research in Electronics 2017 (ASPIRE-2017))
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Performance Analysis of Antenna Using Fdtd |
Country | : | India |
Authors | : | Asmi Kabeer.N || Sajitha.P || Shameer K. Mohammed |
Abstract: Microstrip patch antennas are widely used because of thin profile, light weight, low cost; conformability to shaped surface and compatibility with integrated circuits. In order to increase the strengths of antenna using time domain method, a micro strip patch antenna is directly treated in the time domain, using modified Finite Difference Time Domain (FDTD) method. The Finite Difference Time Domain (FDTD) method, first introduced by Yee, is a powerful, robust, and popular modelling algorithm based on the direct numerical solution of Maxwell'sequationsin the differential, time domain form. The most important feature of the FDTD method is that broad-band frequency information can be provided in a single pass simulation...............
[2]. A. Taflove, "Review of the formulation and applications of the finite difference time-domain method for numerical modeling of electromagnetic wave interactions with arbitrary structures," Wave Motion, vol. 10, no. 6, pp. 547–582, 1988.
[3]. Antenna Theory - Analysis and Design - by Balanis - [2006]
[4]. Ray, K.P., Kumar,Girish , Broad band Microstrip antennas, Artech house,2003.
[5]. Berenger J.P., "A perfectly matched layer for the absorption of electromagnetic wave", Journal of Computational Physics, vol.114, pp.195-200, 1994.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Design Of A Compact Voltage-Doubler-Type Rectenna |
Country | : | India |
Authors | : | Athira A T || Shefin Shoukath || Shameer K Mohammad |
Abstract: The rectenna is an important element for wireless power transmission. Rectenna or rectifying antenna contains a receiving antenna followed by an RF- dc rectifying circuit. Current use of rectenna is in RFID tags, Proximity cards and Contactless smart cards as a power source provider. Simple, compact and lightweight voltage doubler type rectenna, operating at 2.4Ghz frequency range is designed. Here the united configuration of a dipole antenna with a rectangular section on both arms of dipole is used for improving the most nergative return loss . Dipole antenna is widely used because of its simplicity and effectiveness for a wide range of communication..........
Keywords – RF energy harvesting, Rectenna, voltage doubler
[2]. Yi-Yao Hu and Sheng Sun,''Design of a Closely Spaced Element Rectenna for Low- Power Wireless Energy Harvesting'', School of Electronic Engineering , University of Electronic Science and Technology of China, 978-1-4673-8194-9/16/2016 IEEE
[3]. K.L. Narayana, '' Design and Simulation of Rectenna for RF Energy Harvesting'', International Journal for Modern Trends in Science and Technology, 2016
[4]. Chaoyun Song , ''A High Efficiency Broad band Rectenna for Ambient Wireless Energy Harvesting'', IEEE Transactions on Antennas and Propagation, Vol.57, No.18, June 2015
[5]. Paul Carter, ''Rectennas for Microwave Power Transmission'', IEICE Electronics Express, Volume.10, No.21, 1-13, September 2013
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Implementation of Multiband Mimo Antenna For Wireless Applications |
Country | : | India |
Authors | : | Azimuth.R.B || Azim Naz M || Shameer K Mohammed |
Abstract: MIMO (Multiple Input Multiple Output)is an antenna technology for wireless communications on which multiple antennas are used at both the transmitter and the destination(Receiver). This paper is presented with two element compact dual band MIMO antenna system which acts as an array system. The antenna system have two monopole radiating elements. Each monopole radiating element has two arms one is longer and the other is smaller. The antennas resonate at 2.58and 5.4GHz bands. High isolation between antenna elements is achieved done by using isolation techniques such as cross slots, Extended ground plane and parasitic element. Two rectangular slots suppress surface waves. It acts as a band stop filter. Parasitic element direct beam in direction and reduce coupling between space and upper.................
[1]. Anjali A. Chaudhari, Vidya Jadhav, Shilpa U. Kharche, and Rajiv K. Gupta, Compact dual band antenna with high islation for 3/4G ,Wi-Fi, Wi max applications, 2016 progress in electromagnetic research symposium (PIERS), shanghai, china, 8–11 August
[2]. Luyu zhao, Ke-li wu, dual-band coupled resonator decoupling network for two coupled antennas,IEEE transactions on antennas and propagation, vol. 63, no. 7, July 2015
[3]. Zeev iluz, Reuven Shavit, senior member, IEEE, and Reuven bauer microstrip antenna phased array with electromagnetic bandgap substrate,IEEE transactions on antennas and propagation, vol. 52, no. 6, June 2004
[4]. Zhengyi li, Zhengwei du, Masaharu takahashi, Kazuyuki saito, member, and Koichi ito reducing mutual coupling of MIMO antennas with parasitic elements for mobile terminals IEEE transactions on antennas and propagation, vol. 60, no. 2, February 2012
[5]. Yan Wang, Student Member, Zhengwei Du,Wideband printed dual-antenna system with a novel neutralization line for mobile terminals.IEEE antennas and wireless propagation letters, Vol 12, 2013
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Image Segmentation Using Swarm Intelligence Based Graph Partitioning |
Country | : | India |
Authors | : | Dhanya G S || Dr. R. Joshua Samuel Raj || P.Sivasamy |
Abstract: The performances of image segmentation methods are dependent on many factors such as intensity, texture, image content. A single segmentation method cannot be applied to all types of images and, all methods do not perform well for one particular image. The graph based methods achieve segmentation on the basis of local properties of image. To segment images for applications where detailed extraction of features is necessary, consideration of global impression along local properties is inevitable. Efficient implementation, energy consumption and computational time are key aspects in defining performance of these methods...............
Keywords- Graph partitioning, normalized cut, partitioning, refining, SIBGP
[1]. P. Sander, and C. Schulz," High Quality Graph Partitioning," BMSW, pp.19 - 36, 2013.
[2]. G. Karypis and V. Kumar. Analysis of multilevel graph partitioning. Technical Report TR 95-037, Department of Computer Science, University of Minnesota, 1995. Also available on WWW at URL http://www.cs.umn.edu/˜karypis/papers/mlevel analysis.ps.
[3]. G. Karypis and V. Kumar. A fast and high quality multilevel scheme for partitioning irregular graphs. Technical Report TR 95-035, Department of Computer Science, University of Minnesota, 1995. Also available on WWW at URL http://www.cs.umn.edu/˜karypis/papers/mlevel serial.ps. A short version appears in Intl. Conf. on Parallel Processing 1995.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Image Encryption of Biometric Characteristics Using Chaotic System |
Country | : | India |
Authors | : | Gayathri.S.P || Sajeer.M |
Abstract: Nowadays ,due to the rapid development of multimedia and digital technology the transmission over public channel become more and more. Also the issues with the confidentiality and integrity of data increases in an alarming rate. So that the personal identification information or biometric signatures requires a security technique to protect from the any of the unauthorized access. Biometric signatures such as fingerprint , iris , palm print, gestures, handwritten signature and hand geometry have to be considered as an efficient tool for establishing the identity of an individual. Because they contain the unique characteristics of a person. So we go for the proposed biometric information security system using a three fold encryption technique............
Keywords – Orthogonal Coding , Steganography ,Encryption
[1]. M.N. Islam, "Encryption and multiplexing of fingerprints for enhanced security",in: Proceedings of IEEE Long Island Systems, Applications and Technology Conference (LISAT), 2011.
[2]. M.N. Islam," Color image encryption using multiple reference joint transform correlation", in:Proceedings of IEEE Long Island Systems, Applications and Technology Conference (LISAT), 2012.
[3]. M.F. Islam, M.N. Islam, "A secure approach for encrypting and compressing biometric information employing orthogonal code and steganography," in: SPIE Proceedings in Optical Pattern Recognition XXIII, 2012.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | A Reconfigurable Cordic Based Fft |
Country | : | India |
Authors | : | Jismi K |
Abstract: CORDIC (COrdinate Rotation for Digital Computers) is an ideal candidate for the implementation of low power FFT processor, because it uses set of shift-add algorithms which requires less complex hardware than the conventional method which is very well suited for VLSI implementation. This work implements FFT on a reconfigurable CORDIC only processor array. The paper compares the different CORDIC architectures with respect to their area, speed, and power analysis especially in two different major styles iterative and parallel structures. Also implemented the CORDIC based 8-point FFT processor...............
Keywords: Vector rotation, Iterative CORDIC, Parallel CORDIC, Fast Fourier Transform(FFT),FPGA
[1]. J. Volder, "The CORDIC computing technique,"IRE Trans. Electronic Computers, vol. EC-8, pp. 330-334, Sept. 1959.
[2]. J. Walther, "A unified algorithm for elementary functions," Proc. AFIPS Spring Joint Computing Conf., vol. 38, pp. 379-385, 1971.
[3]. Renato Neuenfeld, 2Mateus Fonseca, 1Eduardo Costa"Design of Optimized Radix-2 and Radix-4 Butterflies
[4]. from FFT with Decimation in Time",VII Latin American Symposium on Circuits and Systems (LASCAS) 2016 IEEE
[5]. Uwe Meyer-Baese. "Digital Signal Processing with Field Programmable Gate Arrays". Springer-Verlag, New York, Inc., Secaucus, NJ, USA, pp. 70-75, 200.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Gabor Filter – HOG Based Copy Move Forgery Detection |
Country | : | India |
Authors | : | Monisha Mohan || Preetha V.H |
Abstract: Digital images are used in all places and it is easy to forge and edit because of availability of various image processing and editing software. Copy move forgery is the most common method of image tampering in the case of forged image. Nowadays researchers start studying on detection of different forgery techniques. This paper proposes a block based copy move forgery approach using gabor filter and HOG features. Generally gabor filter is used for texture analysis but it has a disadvantage of having less recognition rate due to almost same value of histogram descriptor.............
Keywords - Copy move forgery, Gabor filter, HOG, Image tampering
[1]. R. Singh, A. Oberoi, and N. Goel, "Copy move forgery detection on digital images," International Journal of Computer Applications, vol. 98, no. 9, pp. 17–22, 2014.
[2]. E. Ardizzone, A. Bruno, and G. Mazzola, "Copy-move forgery detection via texture description," in Proceedings of the 2nd ACM workshop on Multimedia in forensics, security and intelligence, pp. 59–64, ACM, 2010.
[3]. J. Fridrich, D. Soukal, and J. Lukáš, "Detection of copy-move forgery in digital images," in Proceedings of Digital Forensic Research Workshop, Cleveland, Ohio, USA, August 2003.
[4]. Ardizzone E, Bruno A, Mazzola G. Detecting multiple copies in tampered images. In: Image Processing (ICIP), 2010 17th IEEE International Conference on. IEEE; 2010. p. 2117–20.
[5]. Hashmi MF, Hambarde AR, Keskar AG. Copy move forgery detection using DWT and SIFT features. In: Intelligent Systems Design and Applications (ISDA), 2013 13th International Conference on. IEEE; 2013. p. 188–93.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Design of Chipless Rfid Tag Based on Stepped Impedance Resonator In Frequency Domain |
Country | : | India |
Authors | : | Nisha.B || Sabeena.S || Shameer.K.Mohammad |
Abstract: A novel compact 12 bit encoded chipless RFID tag using Stepped Impedance Resonator (SIR) is proposed. The main advantage of SIR compared to other resonators is the independent control over the fundamental as well as harmonic frequency by varying either Impedance ratio (K) or length ratio (α). This type of tag utilizes both fundamental and the harmonic frequency of the SIR to represent two bit information with single resonator. The structural information is encoded based on backscattered resonance signature in the frequency response of the tag. In this paper 6 SIR structures is designed to store 12bit information in the tag. The tag are designeded on FR4 Epoxy (εr =4.4) substrate. The simulation of this resonator is done in HFSS platform.
Keywords - Chipless RFID, Stepped Impedance Resonator, Backscattering
[1]. M. Aminul Islam and Nemai Chandra Karmakar. A Novel Compact Printable Dual-Polarized Chipless RFID System. IEEE transactions on Antenna and Propagation,10.1109/2014.
[2]. Shakil.Bhuiyan and NemaiC.Karmakar, A Spectrally Efficient Chipless RFID Tag Based on Split-wheel Resonator, International Workshop on Antenna Technology, 978-1-4799-2329,2014,IEEE
[3]. Z. Linlin, S. Rodriguez, Z. Lu, S. Botao, and Z. Li-Rong, Design and implementation of a fully chipless RFID tag using Inkjet printing technology, IEEE International Symposium on Circuit and Systems, 2000
[4]. S Preradovic, I Balbin, Nemai Chandra Karmakar and Gerhard F. Swiegers, Multiresonator-Based Chipless RFID System for Low-Cost Item Tracking IEEE Transactions on Microwave Theory and Techniques, vol. 57, no. 5, pp. 1411 – 1419, May 2009
[5]. S.Mukherjee, Chipless Radio Frequency Identification by Remote Measurement of Complex Impedance, in European Conference on Wireless Technologies, 2007, pp. 249-252.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Prevention of Cyber Attacks in the Distribution Automation System Using Symmetric Key Encryption Algorithm |
Country | : | India |
Authors | : | Reeja Rasheed |
Abstract: Distributed Automation System has an inherent vulnerability to cyber attacks due to its high dependency on communication and geographically widely spread terminal devices. Protecting DAS from cyber attack is a major concern of this proposed work. In this, we analyze the types of security goals in various distribution system and efforts are made to identify the most critical security goals in the distribution automation system and propose efficient ways of achieving these goals. The message authentication and integrity is far more important than any other security requirements in the distribution system applications. The proposed work addresses possible cyber threats and overcome.............
Keywords - Cyber security, distribution automation system, power system security
[1]. J. Slay and M. Miller, Lessons Learned From the Maroochy Water Breach. Boston, MA: IFIP Springer, 2007, vol. 253, pp. 73–82
[2]. IT Security Advisory Group, SCADASecurity: Advice for CEOs Dept.Commun. Inform. Technol. and the Arts. Canberra, Australia, 2005.
[3]. President's Information Technology Advisory Committee, Cyber Security:A Crisis of Prioritization Report to the President, Nat. Coord.Office Inform. Technol. Res. and Develop.. Arlington, VA, 2005.
[4]. F. Cleveland, IEC TC57 Security Standards for the Power System's Information Infrastructure—Beyond Simple Encryption IEC TC57 WG15 Security Standards ver5, Oct. 2005.
[5]. IEC Technical Committee 57, Data and Communications Security, Part1: Communication Network and System Security-Introduction to Security Issues IEC TS 62351-1, May 2007.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Secure Sharing of Personal Health Records in Cloud Storage using HASBE |
Country | : | India |
Authors | : | Rojitha Abdulla |
Abstract: Personal Health Records or PHR is the medical information of an individual, stored and managed by the patient himself, in third party servers like clouds, so as to make it available for global data sharing. As the usage of such servers for storage purposes become more complex, they give rise to various security issues. Privacy, scalability and flexibility are some common issues concerning third party servers. Attribute Based Encryption (ABE), one of the earliest methods used for outsourced data encryption, has been utilized in several schemes as a solution, but such designs suffer from inflexibility, when the access control policies.........
Keywords - Flexibility, Access Policy, Scalability
[1]. Ming Li, Shucheng Yu, Yao Zheng, Kui Ren, "Scalable and secure sharing of Personal Health Records in Cloud Computing using Attribute Based Encryption." in IEEE transactions on parallel and distributed systems Vol 24, pages 131-143, Jan 2013.J. Clerk Maxwell, A Treatise on Electricity and Magnetism, 3rd ed., vol. 2. Oxford: Clarendon, 1892, pp.68-73.
[2]. Rojitha Abdulla, Anupriya Vysala, "Secure Personal Health Records in Clouds: A Hierarchical Attribute Based Solution." in International Journal of Computer Science and Mobile Computing, ICMIC13, December- 2013, pg. 44-49.Y.
[3]. Boldyreva, V. Goyal, and V. Kumar, "Identity-based encryption with efficient revocation," in ACM CCS, ser. CCS ‟08, 2008, pp.417–426.‟
[4]. V. Goyal, O. Pandey, A. Sahai, and B. Waters, "Attribute-based encryption for fine-grained access control of encrypted data," in CCS ‟06, 2006, pp. 89–98.
[5]. Melissa Chase "Multi-authority Attribute based Encryption," Computer Science Department Brown University Providence, RI 02912
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Gain Enhancement of Rectangular Slot Microstrip Patch Antenna Using Zero Index Metamaterial |
Country | : | India |
Authors | : | Shaheena N.R || Sajina.S || Shameer K.Mohammed |
Abstract: The advancement of wireless communication necessitates the design of high gain antennas with maximum possible miniaturization for developing compact systems. However, miniaturization leads to poor gain of the antenna. Thus, for effective communication it is important to enhance the gain of the antenna. In this paper the gain enhancement of a rectangular slot microstrip patch antenna with a metamaterial superstrate structure is proposed. High-gain planar antennas are drawing more and more attention because they have a low profile and can be easily fabricated by printed circuit board (PCB) technology. In addition, they are lighter than reflector antennas and are thus much easier to be installed............
Keywords - Zero refractive index, metamaterials, gain enhancement, patch antenna .
[1]. C. Caloz and T. Itoh, "Electromagnetic metamaterials: transmission line theory and microwave applications," John Wiley & Sons, 2005.
[2]. D. R. Smith, W. J. Padilla, D. C. Vier, S. C. Nemat-Nasser, and S.Schultz, "Composite medium sith simultaneously negative permeability and permittivity," Physical Review Letters, Vol. 84, No. 18, pp. 4184- 4187, 2000.
[3]. Y. Dong and T. Itoh, "Metamaterial-based antennas," Proceedings of the IEEE, Vol. 100, No. 7, pp. 2271-2285, 2012.
[4]. D.Deslendes and K.Wu, " Single-Substrate integrated Technique of planar circuits and waveguide filters," IEEE Trans.on Microwave Theory and Tech. , vo1.51, no.2, pp. 593-596, Feb 2003.
[5]. Deepanjan Bhattacharjee, Tarakeswar Shaw, Tarakeswar Shaw, DebasisMitra "Gain enhancement of a slot antenna with a metamaterial superstrate structure"2015 IEEE.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | A New Fangled Seed Construction Algorithm for Text Clustering |
Country | : | India |
Authors | : | Ms.Shamna.B |
Abstract: Clustering is a division of data into groups of similar objects, each group called cluster, consists of objects that are similar between themselves and dissimilar to objects of other groups. In other words, the goal of a good document clustering scheme is to minimize intra-cluster distances between documents ,while maximizing inter-cluster distances. A distance measure(or, dually, similarity measure)thus lies at the heart of document clustering. Text Clustering is a category in clustering where the information which is logically similar is combined together. In the previous approaches K-means algorithm was used. Fore coming is the Affinity Propagation algorithm...............
Keywords - Seed propagation, content clustering, cofeature set, unilateral feature set, major cofeature set, Jaccard index, seed creation.
[1]. N. Jardin and C.J. van Rijsbergen, "The Use of Hierarchic Clustering in Information Retrieval," Information Storage and Retrieval, vol. 7, no. 5, pp. 217-240, 1971.
[2]. G. Salton, Dynamic Information and Library Processing. Prentice-Hall, Inc., 1975.
[3]. G. Salton and M.J. McGill, Introduction to Modern Information Retrieval. McGraw Hill Book Co., 1983.
[4]. E.M. Voorhees, "The Efficiency of Inverted Index and Cluster Searches," Proc. Ann. Int‟l ACM SIGIR, pp. 164-174, 1986.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Compact Vivaldi Antenna With Balun Feed For Uwb |
Country | : | India |
Authors | : | Shijina S || Sareena R || Shameer K. Mohammed |
Abstract: A minimized Vivaldi antenna balun feed operating at UWB frequency from 3 to 10 Ghz is designed. The antenna is developed from the linear tapered slot antenna (LTSA) with a constant curve slope rate. For the feeding configurations coplanar waveguide (CPW) to slot line transition and micro strip line to slot line transitions are used. The antenna balun performance characteristics are measured in terms of VSWR and return loss. To make the structure lossless Rogers RT/Duroid5880 substrate with permittivity 4.4 is used. The antenna modeling is analyzed using HFSS. The VSWR of the antenna is obtained with a value less than 2 for the entire operating frequency range. The obtained return loss also indicates the antenna is having good matching at the output port.
[1]. P.J. Gibson. "The Vivaldi aerial." Proceedings of the 9th European Microwave Conference, pages 101–105, 1979.
[2]. Gazit.E. "Improved Design of the Vivaldi Antenna." Proc.IEE,1988,135H,pp.89-90.
[3]. N.Vignesh " Design and Development of a Tapered Slot Vivaldi Antenna for Ultra-Wide Band Application"
[4]. Volume 4, Issue 5, May 2014 ISSN: 2277 128X
[5]. Peter Ludlow, " Variation of Slotline Characteristic Impedance and Wavelength in a Vivaldi Antenna and Their Effect on Radiation Characteristics". 2009 Loughborough Antennas & Propagation Conference 16-17 November 2009, Loughborough, UK
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | FWM Suppression on Wavelength Converters Using Modulation Techniques |
Country | : | India |
Authors | : | Viji Krishna J S || Pournami S S || Resmy R |
Abstract: Wavelength converters plays an important role for increasing the capacity and flexibility of WDM network. This paper investigates the FWM suppression on wavelength converters using modulation techniques in semiconductor optical amplifier (SOA). FWM is a type of nonlinear effect, and occurs when an optical signal of two or more different wavelengths is launched into medium. The modulation techniques covered are NRZ and RZ. All performances are analyzed in terms of its FWM power and converted signal power. The result assured that the RZ format yields better performance corresponding to less FWM power at different probe power, channel spacing and bit rate. The system was simulated using OptiSystem software version 7.
Keywords - FWM, Wavelength converters, modulators, NRZ, RZ, SOA, OptiSystem
[1]. Rajiv Ramaswami,kumar N Sivarajan,galaen H Sasaki,Optical Networks, a Practical Perspective- Third Edition.
[2]. Rajni, anu Sheetal,(2016) optical Wavelength Converters Based on Four Wave Mixing in SOA-MZI Configuration, ICAET
[3]. Surinder Sign, gursewak Sign Lovkesh,(2015)All Optical Wavelength Conversion Based On Four Wave Mixing In Fiber ,International journal Computer,electrical,automation,control And Information Engineering Vol:9,no:6.
[4]. Surbhi Jain,brintha Therese A,(2015) Four Wave Mixing Nonlinearity Effect In WDM Radio Over Fiber System, International Journal Of Scientific Engineering And Technology,vol:4,no:3,pp:154-158.