Volume-8 ~ Issue-4
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Automated Feedback Based Insulin Regulatory System for Diabetic Patients |
Country | : | India |
Authors | : | Vaibhav C. Pujari, Dr. Sudheer Patil |
: | 10.9790/2834-0840104 |
Abstract: For patients with diabetes especially for Type-I, a.k.a. insulin dependent diabetes, tight control of glucose level is essential. Regulating blood glucose concentration using the insulin infusion device is important for these patients, because they have deficiency of insulin production by pancreas that prevents appropriate metabolism of glucose. This paper is focused to envisage the regulation and management of the concentration of glucose and insulin in the blood of a diabetic. Using this model, a Feedback-loop in a system that regulates and manages the blood glucose-insulin has been designed, implemented and analyzed using Matlab.
Keywords: Insulin, Glucose, Diabetes, Type 1.
[1] Pinky Dua, Francis J .Doyle, and Pistikopoulos, "Model-Based Blood Glucose Control for Type 1 Diabetes via Parametric
Programming," IEEE Transactions on Biomedical Engineering, vol.53, pp.1478-1491, August 2006
[2] Nicolas W. Chbat, Tuhin K. Roy "Glycemic Control in Critically Ill Patients – Effect of Delay in Insulin Administration"
Proceedings of the 2005 IEEE Engineering in Medicine and Biology 27th Annual Conference Shanghai, China, September 1-4,
2005
[3] Zlatko Trajanoski, Paul Wach, "Neural Predictive Controller for Insulin Delivery Using the Subcutaneous Route,"IEEE
Transactions on Biomedical Engineering, vol.45, pp: 1122-1134, 1998
[4 ] J.Geoffrey Chase,Z-H Lan,J-Y Lee,and K-S Hwang, "Active Insulin Infusion Control of the Blood Glucose Derivative," Seventh
International Conference on Cootrol, Automation, pp.1162-1167,December 2002
[5] Jiming Chen, Kejie Cao, 1 You Xian Sun, Yang Xiao, and Xu (Kevin) Su, "Continuous Drug Infusion for Diabetes Therapy: A
Feedback-Loop Control System Design" Received 15 July 2007; Revised 25 November 2007; Accepted 5 December 2007
- Citation
- Abstract
- Reference
- Full PDF
Abstract: In this paper, Bandwidth enhancement of a patch using a new kind of material, so called 'Metamaterial', is being discussed. This new material called Electromagnetic Band Gap (EBG) mushroom type structure is used to replace the commonly used ground plane for the simple patch. The simple patch showed a percentage bandwidth of 1.9%. The bandwidth was found to increase greatly to 39.20% after the replacement of the ground plane. The patch antenna was simulated using the Computer Simulation Tool (CST) Microwave studio.
Keywords: Electromagnetic Band Gap material, Metamaterials , Microstrip patch antenna, Mushroom Structure, Surface waves
[1] Sandhya Bhavsar, Prof. Bharati Singh "Electromagnetic Band Gap Structures Incorporated In Antenna Array: A Review", International Journal of Computer Technology and Electronics Engineering (IJCTEE) Volume 3, Special Issue, March-April 2013,
[2] George V Eleftheraides & Keith G Balmain,"Negative Refraction Metamaterials, Fundamental Principles and Applications .", Proceedings of the IEEE , Vol. 99, No. 10, October 2011
[3] Fan Yang and Yahya Rahmat- Samii, "Reflection Phase Characterizations of the EBG Ground Plane for Low Profile Wire Antenna Applications", IEEE TRANSACTIONS ON ANTENNAS AND PROPAGATION, VOL. 51, NO. 10, OCTOBER 2003.
[4] C. A. Balanis, "Antenna theory , Analysis and Design", 2nd Edition.
[5] Raj Kumar and Jayashree P. Shinde, "On the Effect of Fractal Electromagnetic Band Gap on Antenna Performance", IETE JOURNAL OF RESEARCH , VOL 56 , ISSUE 6 , NOV-DEC 2010.
[6] Tian Hong Loh , "High Impedance Surface Electromagnetic Band Gap Metamaterials:Design approach and applications for antenna engineering".
[7] Simon Tse, John Batchelor, Paul Young, Richard Langley, "Enhanced MEBG patch antenna performance by using a closed edge substrate".
[8] Peter Kovács, Zbyněk Raida, Marta Martínez-Vázquez, "Parametric Study of Mushroom-like and Planar Periodic Structures in Terms of Simultaneous AMC and EBG Properties", RADIOENGINEERING, VOL.17, NO.4, DECEMBER 2008.
- Citation
- Abstract
- Reference
- Full PDF
Abstract: The most necessary issue that has got to be resolved in coming up with a knowledge transmission algorithmic program for wireless detector networks (WSNs) is the way to save detector node energy whereas meeting the desires of application as the detector nodes are battery restricted. Whereas satisfying the energy saving demand, it's conjointly necessary to realize the standard of service. Just in case of emergency work, it's necessary to deliver the info on time. Achieving quality of service in WSNs is additionally necessary. So as to realize this demand, Power-efficient Energy-Aware routing protocol for wireless detector networks is projected that saves the energy by expeditiously choosing the energy economical path within the routing method. Once supply finds route to destination, it calculates Î for every route. The worth Î relies on largest minimum residual energy of the trail and hop count of the trail. If a route has higher Î, then that path is chosen for routing the info. the worth of α are higher, if the biggest of minimum residual energy of the trail is higher and also the range of hop count is lower. Once the trail is chosen, knowledge is transferred on the trail.
Keywords: Power-efficient Energy-Aware routing protocol, AODV, Max-Min energy routing protocol, the largest of minimum residual energy
[1] Adeel Akhtar, Abid Ali Minhas, and Sohail Jabbar, ―Energy Aware Intra Cluster Routing for Wireless Sensor Network, International Journal of Hybrid Information Technology Vol.3, No.1, January, 2010
[2] Zijian Wang, Eyuphan Bulut, and Boleslaw K. Szymanski, ―Energy Efficient Collision Aware Multipath Routing for Wireless Sensor Network, International Conference on Communication June 14-18, 2009.
[3] An Energy-Aware Routing Protocol in Wireless Sensor Networks Ming Liu 1, Jiannong Cao 2, Guihai Chen 3 and Xiaomin Wang Sensors 2009.
[4] Lu Su, Changlei Liu, Hui Songand Guohong Cao ―Routing in Intermittently Connected Sensor Networks‖ 2008 IEEE.
[5] K. Akkaya, and M. Younis, "A Survey on Routing Protocols for Wireless Sensor Networks", Elsevier Ad Hoc NetworkJournal, vol. 3, no. 3, pp 325-349, 2005.
[6] Q. Jiang and D. Manivannan, ―Routing protocols for sensor networks,‖ Proceedings of CCNC 2004, pp.93-98, Jan. 2004.
[7] A.P. Subramanian, A.J. Anto, J. Vasudevan, and P. Narayanasamy, ―Multipath power sensitive routing protocol for mobile ad hoc network, Proc. Conf. Wireless on Demand Network Systems, 2004, LNCS 2928, 2004, pp. 171-183.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Different Modulation Formats Used In Optical Communication System |
Country | : | India |
Authors | : | Shashi Jawla, R. K. Singh |
: | 10.9790/2834-0841518 |
Abstract: In this paper, the objective is to study the performance of different modulation formats.To choose a right modulation format is the basic key to build a flexible and cost effective high capacity optic-fiber network. The performance of ASK,FSK.PSK and PolSK for the optic-fiber is analyzed.
Keywords: Amplitude shift keying (ASK),Frequency shift keying(FSK).Phase shift keying(PSK) and Polarization phase shift keying(PolSK), Non-Return to Zero(NRZ), Return to Zero(RZ), ON-OFF Keying(OOK).
[1] Modulation and Detection Techniques for Optical Communication Systems,Joseph M. Kahn.
[2] J. M. Kahn and K.-P. Ho, "Spectral Efficiency Limits and Modulation/Detection Techniques for DWDM Systems", IEEE. J. on Sel. Topicsin Quantum Electron. 10, 259-272 (2004).
[3] B.Wedding, B. Franz, and B. Junginger, "10-Gb/s optical transmission up to 253 km via standard singlemode fiber using the method of dispersion-supported transmission," Journal of Lightwave Technology, 2(10):1720–1727, October 1994.
[4] M. Rhode, C. Caspar, N. Heimes, M. Konitzer, E. J. Bachus, and N. Hanik, " Robustnessof DPSK direct detection transmission format in standard fiber WDM systems," Electronics Letters, 26(17):1483–1484, August 2000.
[5] C. Wree, J. Leibrich, and W. Rosenkranz, "RZ-DQPSK format with high spectral efficiency and high robustness towards fiber nonlinearities," European Conference on Optical Communication (ECOC), 4(9.6.6), September 2002.
[6] A. Carena, V. Curri, R. Gaudino, N. Greco, P. Poggiolini, and S. Benedetto, " Polarization modulation in ultra-long haul transmission systems: A promising alternative to intensity modulation," European Conference on Optical Communication (ECOC), 1:429–430, September 1998.
[7] M.I.Hayee and A.E.Willner, "NRZ versus RZ in 10-40-Gb/s dispersion-managed WDM transmission systems,"IEEE Photonics Technology Letters, 2003.
[8] H. Sunnerud, M. Karlsson, and P. A. Andrekson, "A comparison between NRZ and RZ data formats with respect to PMD-induced system degradations," IEEE Photonics Technology Letters, 13(5):448–450, May 2001.
[9] P. J. Winzer and A. Kalmar, "Sensitivity enhancement of optical receivers by impulsive coding," J. Lightwave Technol., vol. 17, pp.171–177, Feb. 1999.
[10] G. Castanon and T. Hoshida, "Impact of dispersion slope in NRZ, CSRZ, IMDPSK and RZ formats on ultra high bit-rate systems," European Conference on Optical Communication (ECOC), 4(9.6.1), September 2002.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Face recognition technique for door phone embedded system |
Country | : | India |
Authors | : | K. Swathi, T. Siva |
: | 10.9790/2834-0841922 |
Abstract: This paper describes the architecture of a face recognition technique for door phone embedded system with interactive face and voice response. for the face recognition method using PCA algorithm. In this paper feature is extracted using PCA. The face recognition system using UVC Driver camera has been considered. The proposed system recognize the persons up to 300 cm and send feedback to mobile by using GSM in the form of message. In addition to this, an UVC webcam is connected to 32-bit ARM micro controller which supports features and algorithms for designing of face recognition and voice recognition system. In the proposed system, after completion of face recognition the message will be send to sender mobile by using GSM modem, that word is pronounced at the MIC of the 32-bit ARM controller. Then the door will be get accessed. The algorithms are implemented in Open CV, which runs on Linux.
Keywords : Face recognition, voice, Principal Component Analysis, Euclidean distance.
[1] Mattew Turk and Alex Pentlands," Eigen faces for Recognition," SPIE Vol.1192 IRCVVIn (i989), 22-32.
[2] Kirby and Sirovich, 1990. Application of Karhunen-Loeve procedure for the characterization of human faces. IEEE Face
Recognition based on PCA Algorithm Special Issue of International Journal of Computer Science & Informatics (IJCSI), ISSN
(PRINT): 2231–5292, Vol II, Issue-1, 2Trans.pattern analysis and machine intelligence, 12:103-108.
[3] Turk, M.A. and A.L. Pentland, 1991. Face Recognition using Eigen faces. Proc. IEEE Computer society Conf Computer Vision
and pattern recognition, pp: 586-591.
[4] Kyungim Baek, Bruce A. Draper, J. Ross Beveridge, Kai She,"PCA vs. ICA: A Comparison on the FERET Data Set", Proceedings
of the 6th Joint Conference on Information Science (JCIS), 2002, pp. 824-827
[5] T. Chen, W.Yin, X.-S. Zhou, D. Comaniciu, T. S. Huang,"Total Variation Models for Variable Lighting Face Recognition and
Uneven Background Correction", IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 28(9), 2006, pp.1519 -1524
[6] Longin Jan Latecki, Venugopal Rajagopal, Ari Gross, "ImageRetrieval and Reversible Illumination Normalization", SPIEIIS&T
Internet Imaging VI, vol. 5670, 2005
[7] P. J. B. Hancock, V. Bruce and A. M. Burton, "Testing Principal Component Representations for Faces", Proc. of 4th Neural
Computation and Psychology Workshop, 1997.
[8] Jonathon Shlens, "A Tutorial on Principal Component Analysis", Systems Neurobiology Laboratory, Ver.2, 2005
[9] Zhujie, Y.L.Y., 1994. Face recognition with Eigen faces. Proc.IEEE Intl. Conf. Industrial Technol. Pp: 434-438.
[10] Debipersand, S.C. and A.D Broadhurst, 1997. Face recognition using neural networks. Proc. IEEE Commun. Signal Processing
(COMSIG'97), pp: 33-36.
- Citation
- Abstract
- Reference
- Full PDF
Abstract: To accommodate high performance and high bit rates for multimedia applications in present and future wireless communication systems, it is essential that modulation techniques applied in this scenario are able to support high data rates upto and above 200 Mbps. To meet the increased demand of higher bit rates, the wireless systems are incorporating the multi-carrier modulation techniques ,such as FFT based MCM which is also known as conventional OFDM and wavelet transform based MCM. Wireless multicarrier modulation is a technique of transmitting data by dividing the input data stream into parallel sub-streams that are each modulated and multiplexed onto the channel at different carrier frequencies. In this paper, we studied the performance of DWT based MC-CDMA and FFT based MC- CDMA modulations for transmission over wireless fading channels. This scheme is shown to be overall quite similar to FFT based OFDM modulation, but with some interesting additional features and improved characteristics. Results shows that DWT based MC-CDMA modulation has better bit error rate (BER) performance than conventional FFT based CDMA without cyclic prefix (CP) for all signal-to-noise ratios and also outperforms FFT based CDMA for low signal-to-noise ratio values.
Key words: Code division multiple accesses, discrete wavelet transform, Multicarrier modulation, Orthogonal Frequency Division Multiplexing,
[1]. J. A. C. Bingham, "Multicarrier modulation for data transmission: an idea whose time has come,"IEEE Communications
Magazine, vol. 28, no. 5, pp. 5–14, May 1990.
[2]. Shinsuke Hara, and Ramjrr Prasad. "Multicarrier Techniques for 4G Mobile Communications," Artech House, Boston. London,
(2003).
[3] . J. G. Proakis, Digital communications, 3rd ed. Mc Graw Hill international editions, 1995.
[4]. N. Erdol, F. Bao, and Z. Chen, "Wavelet modulation: a prototype for digital communication systems," in IEEE Southcon
Conference, 1995, pp. 168–171.
[5]. C. K. Chui, An introduction to wavelets. Academic Press,1992, vol. 1.
[6]. R. Dilmirghani, M. Ghavami, "Wavelet Vs Fourier Based UWB Systems", 18th IEEE International Symposium on Personal, Indoor
and Mobile Radio Communications, pp.1-5, September 2007.
[7]. A. Akansu, P. Duhamel, X. Lin, and M. de Courville, "Orthogonal transmultiplexers in communications: a review,"IEEE
Transactions on Signal Processing, vol. 46, no. 4,pp. 979–995, April 1998.
[8]. Y. Li, G.L. Stuber, Orthogonal Frequency Division Multiplexing for Wireless Communications, Springer, 2006.
[9]. T.S. Rappaport, Wireless communications: principles and practice.Vol. 2, 1996: Prentice Hall PTR
[10]. Andrea Goldsmith, Wireless Communications, Cambridge University Press, (2005).
- Citation
- Abstract
- Reference
- Full PDF
Abstract: The spectrum sensing related issues has come up with new aspects with cognitive radio and opportunistic spectrum access concepts. Spectrum sensing by far is the most important component for the establishment of cognitive radio. In this paper, some of the spectrum sensing methodologies for cognitive radio is presented. The Challenges associated with spectrum sensing are given and enabling spectrum sensing methods are reviewed. In this paper, an efficient recursive least square (ERLS) algorithm is proposed for improving the power signal spectral estimation. The proposed ERLS algorithm is the combination of wavelet algorithm and artificial neural network (ANN).
Key words : Cognitive radio, dynamic spectrum access, multi-dimensional spectrum sensing, WSS-wide sense stationary, CSD- cyclic spectral density, FFT- fast fourier transforms, ERLS-effective recursive least square algorithm, ANN-artificial neural networks.
[1] I. Mitola, J. and J. Maguire, G. Q.,"Cognitive radio: making software radios more personal," IEEE Personal Commun. Mag., vol. 6, no. 4 pp. 13–18, Aug. 1999.
[2] Federal Communications Commission, "Notice of proposed rule making and order: Facilitating opportunities for flexible, efficient, and reliable spectrum use employing cognitive radio technologies," ET Docket No. 03-108, Feb. 2005.
[3] Federal Communications Commission, "Notice of proposed rule making: Unlicensed operation in the TV broadcast bands," ET Docket No. 04-186 (FCC 04-113), May 2004.
[4] P. Kolodzy et al., "Next generation communications: Kickoff meeting," in Proc. DARPA, Oct. 2001.
[5] R. Matheson, "The electrospace model as a frequency management tool," in Int. Symposium On Advanced Radio Technologies, Boulder,
[6] A.L.Drozd,I.P.Kasperovich ,C.E.Carroll and A.C.Black burn, "Computational electromagnetics applied to analyzing the efficient utilization of the RF transmission hyperspace," inProc. IEEE/ACES
[7] S. Shankar, C. Cordeiro, and K. Challapali, "Spectrum agile radios: utilization and sensing architectures," inProc. IEEE Int. Symposium on New Frontiers in Dynamic Spectrum Access Networks, Baltimore,
[8] Y. Hur, J. Park, W. Woo, K. Lim, C. Lee, H. Kim, and J. Laskar, "A wideband analog multi-resolution spectrum sensing (MRSS) technique for cognitive radio (CR) systems," in Proc. IEEE Int. Symp. Circuits and Systems, Island of Kos, Greece, May 2006, pp. 4090–4093.
[9] D. Cabric, A. Tkachenko, and R. Brodersen, "Spectrum sensing measurements of pilot, energy, and collaborative detection," inProc. IEEE Military Commun. Conf., Washington, D.C., USA, Oct. 2006,
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | DESIGN OF 4 BIT BINARY ARITHMETIC CIRCUIT USING 2'S COMPLEMENT METHOD |
Country | : | India |
Authors | : | Dhrubo Jyoti Ghosh, Suchandana Roy Saha |
: | 10.9790/2834-0843942 |
Abstract: This paper presents a technique to design a 4bit binary arithmetic circuit capable of doing addition and subtraction operation using 2's complement method. As the 2's complement method is more advantageous than 1's complement method, the explored method of the circuit of 2's complement method along with the conventional 4 bit adder-subtractor composite unit achieves the design to get perfect result. By this circuit we can add or subtract any two numbers with any sign in an efficient way without employing the human brain.
Keywords: Control inverter, Control sign input, Composite unit, Sign magnitude bit output, Full adders.
[1] D. Sangwan and M. K. Yadav, "Design and Implementation of Adder/Subtractor and Multiplication Units for Floating-Point Arithmetic", International journal of ElectronicsEngneeing,2(1), 2010,pp.197-203.(8)
[2] D. Ghosh,"Design of 4-Bit Adder Subtractor Composite Unit Using 2's Complement Method
[3] Goggle search, Digital adder circuit,http://mindcraft.gamepedia.com/Tutorials/Advanced_redstone_circuit
[4] Google search,digital logic circuit design, http://ozark.hendrix.edu/~burch/logisim/
[5] U. Kulisch, "Advanced Arithmetic for the Digital
[6] Wikipedia,adder-subtractor composite unit, http://en.wikipedia.org/wiki/Adder%E2%80%93subtractor
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Image Encryption of Underwater Bodies Using Wavelets 2013 |
Country | : | India |
Authors | : | Prathiba Murali Krishna |
: | 10.9790/2834-0844345 |
Abstract: The explosive growth of multimedia information and its transmission over the widely opened communication channels requires heightened awareness of security. Transmitting and storing of images which forms the highest percentage of multimedia data in a highly secured manner is quite challenging. Hence image encryption is a key weapon to maintain confidentiality from unauthorized person. In this paper, the proposed algorithms used for image encryption using wavelets for underwater bodies is more effective and efficient as compared to previous techniques. To achieve secure, reliable and encrypted image transmission from unmanned vehicle by using new image encryption technique using wavelet transformation. Encryption is required for transmission of images captured from undersea using existing small bandwidth channels as it is capable to compressing and decompressing the image and secure transmission is possible between ships and ground station.An implementation could be taken up using various possible channels with low bandwidth and highly noisy conditions.
Keywords: Encryption, Underwater images, Wavelets
[1] Jun Peng, Du Zhang,"Image Encryption and Chaotic Cellular Neural Network"-http://www.springerlink.com/index/m6270ug45121260g.pdf
[2] Prof.Geetham Singh Tomar," Image capture and secure transmission forunmanned Vehicles over/under sea", , VITM Indore,2010
[3] Quist-Aphetsikester and Koumadi,KoudjoM ,"Cryptographic Technique for image encryption based on the RGB PIXEL Displacement". 2012 IEEE 4th International Conference on Adaptive Science & Technology (ICAST)
[4] Amnesh Goel, Reji Mathews & Nidhi Chandra, "A Technique for Image Encryption with combination of Pixel rearrangement scheme based on Sorting Group-Wise of m RGB Values and Explosive Inter-Pixel Displacement", International Journal of Image,Graphics and Signal Processing, March 2012,2,16-22.
[5] Amrita Sahu, Yogesh Bahendwar, Swati Verma, and Prateek Verma," Proposed Method of Cryptographic Key Generation for Securing Digital Image",International Journal of Advanced Research in Computer Science and Software Engineering, Volume 2, Issue 10, October 2012 ISSN: 2277 128X
[6] Information available via www at http://en.wikipedia.org/wiki/Open_communication.
[7] Information available at http://netghost.narod.ru/gff/graphics/book/ch09_06.htm
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Performance comparison of queuing algorithms: a review |
Country | : | India |
Authors | : | Kamalpreet Kaur, Navdeep Kaur, Gurjeevan Singh |
: | 10.9790/2834-0844648 |
Abstract: Denial of service attacks produce very large amount of packets by a large amount of agents, these packets can easily interfere with the original flow and communication source within very short duration of time. The low rate distributed denial of service attacks (LDDoS) is those which produce less amounts of packet to attack flows. They are a combination of a large number of LDoS flows. There are several techniques called queuing algorithms which are introduced to fight LDDoS attacks. In our research work we will compare some of these queuing management techniques to find the best among them. This review paper will be helpful in our further work.
Keywords: BLUE, CBQ, DROPTAIL, RED, SFQ
[1] Changwang Zhang , Zhiping Cai , Weifeng Chen , Xiapu Luo , Jianping Yin, Flow level detection and filtering of low-rate DDoS attacks,SciVerse science direct, Computer Networks 56 (2012) 3417–3431
[2] Saman Afrasiabi , Farzaneh Abazari, The evaluation of the behavior of computer networks by NS simulator and the effect of queuing systems in the performance of especial networks , Life Science Journal 2013;10(1)
[3] Mohit Agrawal1, Navneet Tiwari , Lalla Atul Singh Chaurasia and Jatan Saraf, Performance Comparison of Active Queue Management Algorithms, 2009 International Symposium on Computing, Communication, and Control (ISCCC 2009) Proc .of CSIT vol.1 (2011) © (2011) IACSIT Press, Singapore
[4] E McKenney, ibm Beaverton, Stochastic Fair Queuing paul ,supported by Rome Air Development center and the Defense Advanced Research Projects Agency under contract number F30602-89-C-0015, and SRI internal Research and Development.
[5] Shaveta, Harsh Verma, Ashish kumar, Performance Evaluation of AQM Algorithms for PGM based group communication in PIM-DM Multicasting Network, International Journal of Computer Science & Engineering Technology (IJCSET), Vol. 4 No. 06 Jun 2013.
[6] Ashish Kumar , Ajay K Sharma , Arun Singh, Comparison and Analysis of Drop Tail and RED Queuing Methodology in PIM-DM Multicasting Network, (IJCSIT) International Journal of Computer Science and Information Technologies, Vol. 3 (2) , 2012,3816 – 3820
[7] Serhat ÖZEKES, evaluation of active queue management algorithms, Istanbul Ticaret Üniversitesi Fen Bilimleri Dergisi Yıl:4 Sayı:7 Bahar 2005/1 s.123-140
[8] Bin Xiao · Wei Chen · Yanxiang He, A novel approach to detecting DDoS attacks At an early stage, J Supercomput (2006) 36:235–248 DOI 10.1007/s11227-006-8295-0
[9] (http://tools.cisco.com/ITDIT/CFN/Dispatch?act=featdesc&task=display&featureId=6502)
[10] (http://www.cisco.com/en/US/prod/collateral/switches/ps5718/ps7078/prod_qas0900aecd805bacc7.html)
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | GSM Signal Detector With Audio Visual Alert Indication Using Psoc Mixed Signal Array |
Country | : | India |
Authors | : | K. Raju, K. Satyavathi |
: | 10.9790/2834-0844952 |
Abstract: in this paper describes the path follower robot series which helps in detecting the signals from far distance, any land mine, and any gas leakage in surroundings.The design is to provide a detector to sense the signal transmission from any far distance, any leakage of gas, any presence of any land mine etc. The GSM transmission detector can sense the presence of an activated mobile phone from a distance. So it can be used to prevent use of mobile phones in examination halls, confidential rooms, etc. In this design the sensors to detect the signals are attached to the Psoc. The path follower which is connected to the Psoc when it detects the signals from any far distance ,if any leakage of gas takes place near to it ,if any land mines are present near to the path which is following by the path follower it gives the indication by indicators like alarm,led,buzzer etc.
Keywords: PSoC (Programmable System on Chip), GSM signal detector, landmine detector, gas leakage detector, signal indicators and display devices.
[1]. Muhammad Ali Mazidi, Rollin D. Mackinlay, Embedded systems Using Assembly and c, Danny Causey; Pearson International Edition.
[2]. Tire pressure Monitoring system, Hilmi Bin MohdZahidi (university Malaysia Pahang).
[3]. Young, Kar-Keung D. "Automated navigation and mobile vehicle control using wireless sensor network technology," Proceedings of the IEEE International Conference on Industrial Technology, 2008
[4]. Shan Changing. The design of ultrasonic obstacle avoidance system based on S3C2410 Computer and digital engineering, 2009.
[5] J. Yang, Z. Mao, L. Tijerina, J. Coughlin, and E. Feron, "Detection of driver fatigu caused by sleep deprivation," IEEE Trans. Syst., Man, Cybern.A, Syst., Humans, vol. 39, no. 4, pp. 694–705, Jul. 2009.
[6] DOT: Intelligent vehicle initiative. United States Department of Transportation.http://www.its.dot.gov/ivi/ivi.htm./
[7] Singh, Sarbjit and Papanikolopoulos, N.P. "Monitoring Driver Fatigue Using FacialAnalysis Techniques", IEEE Intelligent Transport System Proceedings (1999), pp314-318.
- Citation
- Abstract
- Reference
- Full PDF
Abstract: In this paper, we propose four different shapes - square, circular, triangular, and rhombic- of single complementary double negative metamaterial (C-DNM) structure incorporated into the square patch antenna. We compare the performance of the proposed structure with a conventional patch antenna, in a same parametric analysis with HFSS simulator. The operating frequency of this antenna is around 12 GHz for X-band applications. The parameters that considered in these works are resonant frequency, reflection coefficient, directivity, bandwidth and radiation pattern. The focusing parameter is to achieve the better directivity gain and directional radiation pattern that obtained from the single double negative C-DNM patch antenna. The simulations show that the addition of C-DNM to square patch antenna provides better performance in terms of directivity 7.78dB to 8.02dB for square metamaterial. Keywords: microstrips patch antenna, double negative metamaterial, directivity, radiation pattern, reflection coefficient.
[1] V.G Veselago, The electrodynamics of substances with simultaneously negative values of ε and μ, Soviet Physics Uspekh. vol. 10, no.4, pp. 509, Jan – Feb. 1968.
[2] J.B PENDRY, Negative Refraction Makes a Perfect Lens, In Phys. Rev. Lett,vol. 85, No. 18, pages 3966_3969, 2000.
[3] D Steyaert, Nouvelles structures à bande interdite photonique pour applications antennaires, Master work, University of Bordeaux1, 2006.
[4] S Yahya, H Khraisat1, Melad M Olaimat2 and Sharief N. Abdel-Razeq, Comparison between Rectangular and Triangular Patch Antennas Arrays, Applied Physics Research Vol. 4, No. 2; 2012.
- Citation
- Abstract
- Reference
- Full PDF
Abstract: Cognitive radio refers to an intelligent radio, which has the ability to sense the external environment, learn from history and make intelligent decisions to adjust its transmission parameters according to the current state of the wireless channel. Spectrum sensing is an important aspect in the implementation of cognitive radios. The efficiency of spectrum sensing is largely impacted by the interferences in the primary channel. In this paper, a mathematical model for these interferences is first developed and a highly Sophisticated adaptive resonance theory based neural network technique is proposed to Mitigate the effect of such interferences. Additionally it is to be noted that the spectrum Sensing duration and the data transmission duration also have a significant impact on the Throughput of the cognitive network. So, in the latter part of the work, a novel back propagation neural network based throughput maximization technique is proposed and its efficiency is tested by simulations.
Keywords: Cognitive Radio, Interference, Spectrum Sensing, Throughput, Neural network.
[1] Vanessa Ann Davies, Evaluating Mobility Models Within An Ad Hoc Network. A Master's Thesis, Golden, Colorado, 2000.
[2] Bakin, D., Evolution of 802.11 (physical layer)
[3] 802.11a Standard, http://standards.ieee.org/catalog/olis/lanman.html [4] Taub & Schiling, Principles Of Communication System, TMH, 2004.
[5] Bhattacharya, P. P., A Novel Opportunistic Spectrum Access For Applications In Cognitive Radio
[6] Ian F. Akyildiz, Won-Yeol Lee, Mehmet C. Vuran, Shantidev Mohanty, Next Generation/dynamic spectrum access/cognitive radio wireless networks: A survey, Computer Networks, 2006
[7] Amir Ghasemi, Elvino S. Sousa,April 2008,‖ Spectrum Sensing In Cognitive Radio Networks:Requirements, Challenges And Design Trade-Offs‖, IEEE Commun. Mag., vol. 46, no. 4, pp.32—39.
[8] Bogatinovski.M, and L. Gavrilovska,2008 ―Overview of Cross-Layer Optimization Methodologies for Cognitive Radio‖, 16th Telecommunications Forum TELFOR, pp. 254 – 257.
[9] Feng Gao, Wei Yuan, Wei Liu, Wenqing Cheng, and, Shu Wang ,2009,‖ Pipelined Cooperative Spectrum Sensing in Cognitive Radio Networks‖, IEEE Communications Society, WCNC 2009 Proceedings.
[10] Fehske.A, J. Gaeddert, and J. H. Reed ,2005 ,‖ A New Approach to Signal Classification Using Spectral Correlation and Neural Networks‖, 1st IEEE International Symposium on New Frontiers in Dynamic Spectrum Access Networks, DySPAN 2005, pp 144-150.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Automatic Meter Reading System using CAN bus and Zigbee |
Country | : | India |
Authors | : | Erapani Hanna, G. Mani kumar |
: | 10.9790/2834-0846772 |
Abstract: With the rapid development of automation and measuring techniques, automatic recording of the data in the meter reading instrument has gradually become the target of people whose working, living, and home conditions are of increasingly high level of intelligence. Meanwhile, utilities also hope that the development of new technologies to solve the problems they encountered in the practical work about cumbersome meter reading and no reliable protection of accuracy and real time; and enable both user friendly and improving public sector efficiency and management level. Existing wire-line meter reading system has a large number of risks. Wires are more complex, detrimental to adjustment and maintenance of the system. The long-term indoor and outdoor installation easily leads to aging, resulting in a risk of short circuit and breakage. For these reasons, it has become the industry very unresolved problem to design a remote meter reading system, with long-term reliance and convenient installation & maintenance, which not only read data automatically but also monitor operation status. In this Paper we propose an automatic meter reading system which uses CAN Bus and Zigbee Technology to deliver the power consumption details to the sub station.
Keywords: Zigbee, Meter Reading, CAN
[1] Satoshi Takahashi, Jeffrey Wong, Masakazu Miyamae, Tsutomu Terada, Haruo Noma, Tomoji Toriyama, Kiyoshi Kogure, Shojiro Nishio, "A ZigBee-based sensor node for tracking people's locations", proceedings of the 2nd ACM international conference on Context-awareness for selfmanaging systems, 2008, pp. 34-38.
[2] Sumi M, Ebrahim A. Soujeri, Rahim Rajan, Harikrishnan A. I, "Design of a zigbee-based RFID network for industry applications", proceedings of the 2nd international conference on Security of information and networks, 2009, pp. 111-116.
[3] Sharly Joana Halder, Tae Young Choi, Jin Hyung Park, Sung Hun Kang, Sin Woo Park, Joon Goo Park, "Enhanced ranging using adaptive filter of ZIGBEE RSSI and LQI measurement", Proceedings of the 10th International Conference on Information Integration and Web-based Applications & Services, 2008, pp. 367-373.
[4] Hung-Cheng CHEN, Long-Yi CHANG "Design and Implementation of a ZigBee-Based Wireless Automatic Meter Reading System" PRZEGLĄD ELEKTROTECHNICZNY (Electrical Review), ISSN 0033-2097, NR 1b/2012, p. 63-68.
[5] Yu Hai-bin, Zeng Pengo Intelligent Wireless Sensor Network Systems [M). Beijing: Science Press, 2006.
[6] Zigbee Standards Organization, Zigbee Specification, Zigbee Document 053474r17, January 17, 2008.
[7] S. Wei, L. Li-li, "Multi-parameter Monitoring System for Coal Mine based on Wireless Sensor Network Technology", Proc. international IEEE Conference on Industrial Mechatronics and Automation, pp 225-27, 2009.
[8] N. Chaamwe, W. Liu, H. Jiang, "Seismic Monitoring in Underground Mines: A case of Mufulira Mine in Zambia Using wireless Sensor Networks for Seismic Monitoring", Proc. IEEE international Conference on Electronics and Information Engineering, vol. 1(V1), pp 310-14, 2010.
[9] Qiao Ying-xu, Design of Wireless Sensor Networks Node Based OnTinyOS Operating System.The 3th International Conference on Computer Science and Education[C] 2008.7 1201-1204
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Implementation of reduced memory Viterbi Decoder using Verilog HDL |
Country | : | India |
Authors | : | Kumar Pari, B. Raghavaiah |
: | 10.9790/2834-0847379 |
Abstract: The best way of decoding against random errors is to compute the received sequence with every possible code sequence. This is called maximum likelihood (ML) decoding. The criterion for deciding between two paths is to select the one having the smaller metric. The rule maximizes the probability of a correct decision. The Andrew Viterbi proposed an efficient algorithm to find the minimum distance to received sequence in a trellis. It's named after him as Viterbi algorithm (VA). This was recognized by Forney to be Maximum Likelihood decoder. The Viterbi algorithm occupies large memory and computational resources. To address this problem Proposed Viterbi Algorithm is introduced. The Proposed Viterbi decoder functionally is same as the previous Viterbi decoder but it reduces memory and the hardware resources. The proposed block diagram checks every node for path metric value and eliminates the path that is found if it is not having minimum distance.
[1] Bernard Sklar ,"Digital communication Fundamentals and Applications", 2nd edition ,Prentice Hall, ISBN:81-7808-373-6, 2001.
[2] http://www.vocal.com/data_sheets/ 802.11a5.html (last accessed on 12/11/08)
[3] http://www.doe.carleton.ca/~jknight/ 97.48/97.478_01F/Conv1_2LabsB.html (last accessed on 21/12/08)
[4] Michael Purser , "Introduction to Error- correction codes", Artech House INC,ISBN: 0-89006-784-8 ,1996 .
[5] Shu Lin and Daniel J. Costello, "Error Control Coding Fundamentals And Applications", 2nd edition, Prentice Hall, 1984.
[6] Fei Sun and Tong Zhang , "Low-Power State-Parallel Relaxed Viterbi Decoder" , IEEE Transactions on Circuits and systems , Vol. 54, Page(s)-1060-1069, No. 5, May 2007.
[7] ftp://ftp.cs.man.ac.uk/pub/amulet/theses/Shao07_phd.html (last accessed on 2/2/09)
[8] Rex Andrew Antony," An Adpative threshold strategy for soft decision Viterbi Decoder", Dalhouse university, December 2002
[9] QIN Xiang-Ju'.', ZHU Mmg -Cheng', WEI Zhong-Yi2, CHAO Du" , "An Viterbi Decoder Based on FPGA Dynamic Reconfiguration Technology", IEEE International Conference on Field-Programmable Technology 2004, Vol. 10, Page(s)-6-8 December , 2004.
[10] Ming-Hwa Chan, Wen-Ta Lee, Mao-Chao Lin and Liang-Gee Chen , "IC Design of an Viterbi Decoder", IEEE Transactions on Consumer Electronics, Vol. 42, Page(s)-52-62 ,No. 1, February 1996