Series-1 (March-April 2019)March-April 2019 Issue Statistics
- Citation
- Abstract
- Reference
- Full PDF
- Download Cover Page
Abstract: In this paper, design and realization of a 3D printed D-dot type probe is studied for measurement of Electromagnetic Pulse (EMP). D-dot probe is firstly designed in a 3D Electromagnetic simulation tool CST. Next, the 3D modelled probe design is realized with the usage of 3D printing technology and its experimental performance is measured. The 3D printed D-dot probe prototype is tested in accordance with the requirement of RS105 test using an EMP generator and a GTEM cell. The experimental results of the proposed 3D printed D-dot probe then are compared with a counterpart commercial probe and it is found that the response of both probes are have similar characteristics for the EMP signal. Thus it can be concluded that the proposed method is a prototyping method for the EMP probes of the desired level in a fast and cost efficient ways.
Index Terms - D-Dot probe,EMP Measurement, 3D printer.
[1]. B. H. Zhou, B. Chen, L. H. Shi, EMP and EMP Protection, National Defense Industry Press, Beijing, 2003.
[2]. IEC 61000-2-9, Description of HEMP Environment radiated Disturbance, International Electrotechnical Commission, 1998.
[3]. MIL-STD-461E, Requirements for the Control of Electro-magnetic Interference Characteristics of Subsystems and Equipment,
Department of Defense, USA, 1999.
[4]. R. Hoad, N. J. Carter, Rends in EM susceptibility of IT equipment, IEEE Transactions on Electromagnetic Compatibility, Vol. 46,
Issue 2, 2004, pp. 391-396.
[5]. C. E. Baum, From the electromagnetic pulse to highpower electromagnetics, Proceedings of the IEEE, Vol. 80, Issue 6, 1992, pp.
789-817. 294-296..
- Citation
- Abstract
- Reference
- Full PDF
Abstract: This Paper Presents a comprehensive investigation of the RF Signal Strength of Love FM Transmitter in Port Harcourt, Nigeria. The Signal measurement were carried out at different locations with the aid of a GPS band scanner. A maximum distance of 6KM was chosen with respect to the North, South, East and West of the Transmitter. The measuring points have interval of 1km from each other, summing up to 24 different measuring points. The result of the measurement was used to plot the attenuation decay curve of Love FM Radio station's transmitting antenna. The personal computer used for the exercise displays the outputs and results such as the Distance, electromagnetic.......
Index Terms - Antenna, Band Scanner, Signal, Transmitter
[1]. B.I. Bakare and J.C Ozogbuda (May 2018). Measurement and Analysis of Electromagnetic Field Strength in Port Harcourt and its Environs Due to Treasure F.M Radio Transmitter, European Journal of Electrical and Computer Engineering [Online].2(4).pp.09-14. Available: https://doi.org/10.24018/ejece.2018.2.4.14
[2]. WhatIs.com,http://whatis.techtarget.com/definition/magnetic-field-strength. 1999-2017
[3]. Band Scanner GPS. [Online] Available: http://www.deva-fm-monitoring.com/products/band-scanner-gps.
[4]. R. Gowri, Electromagnetic fields and waves (New Delhi: S. K. Kataria and Sons, 2008).
[5]. Robert E. Collin, Antennas and Radio –wave Propagation, (Mcgraw – Hill Book, First Edition,1985.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Design and Analysis of High Performance PISO & PIPOShift Registers |
Country | : | India |
Authors | : | Namrata Joshi || Ravi Jangir |
: | 10.9790/2834-1402011318 |
Abstract: Shift registers plays a vital role in many of the digital systems. They are used to store binary information and this binary data can insert or shift using flip flops. By the use of sequential I/O channels shift register plays an important link between systems.With the downscaling of chip size in VLSI technology, the prime factor to design any circuit is power dissipation. This work enumerates implementation of PISO & PIPO shift register by master slave D flip flop as a storage element using BICMOS logic. Cadence EDA tool has used to design proposed shift registers at 180nm technology. Supply voltage is varying between 1.2 to 2v and frequency of clock signal is 200MHz. Results of power dissipation for the proposed shift registers have compared with the results of conventional design using CMOS technology, which clearly shows that proposed circuits have less power dissipation compared to conventional circuits
Keywords - PISO & PIPO Shift Register, BICMOS, Master-Slave D flip flop,Latch up, Cadence
[1]. Divya Bora, Dr. U. M. Gokhale, "Design of Different Devices using BICMOS Logic", International Journal of Latest Research in Engineering and Technology (IJLRET),(2016), vol. 2,issue 5, page 69-73.
[2]. Achyutpandey, Ravi Mohan, Vivek Dubey, "Design and analysis of self clocked flip-flop based shift registers using 90 nm CMOS technology", International Journal of scientific research and management (IJSRM), (2015), vol. 3, issue 3, page 2397-2400.
[3]. Raj Kumar Mistri, Rahul Ranjan, Pooja Prasad, Anupriya"IC Layout Design of 4-bit Universal Shift Register using Electric VLSI Design System International Journal of Engineering Research & Technology (IJERT), (2017), vol. 6,issue 4, page 252-256.
[4]. A.Lakshmi, Dr.P.Chandrasekhar Reddy, "Design and Simulation of Low Power, High Performance Registers using MUX Based D Flip-Flop", IOSR Journal of VLSI and Signal Processing (IOSR-JVSP), (2019), vol. 9, issue 1, page 14-22.
[5]. Saranya.M, V.Vijayakumar, T.Ravi, V.Kannan, "Design of Low Power Universal Shift Register", International Journal of Engineering Research & Technology (IJERT)(2013),vol. 2, issue 2,page 1-6...
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Planning and simulation of LTE radio network: case of the city of Yaoundé |
Country | : | Cameroon |
Authors | : | Raphaël Nlend || Emmanuel Tonye |
: | 10.9790/2834-1402011929 |
Abstract: This article is a simulation of the LTE network, in the 1800 MHz band on a 20 MHz channel, using ATOLL software in the city of Yaoundé, the capital of Cameroon, which covers an area of approximately 183 km2. This study, which takes into account existing 3G sites, does a coverage planning based on the COST-231 propagation model and the capacity planning based on a service and traffic models. The simulation results indicate that the city of Yaoundé requires 244 LTE sites. ATOLL simulations then display a received signal level of more than -95 dB in almost all the entire area of interest.
Keywords - LTE, coverage, capacity, traffic.
[1]. Jaana Laiho, Achim Wacker, Tomá Novosad (editors). Radio Network Planning and Optimisation for UMTS. Second edition. England. John Wiley & Sons Ltd, 2006.
[2]. Zhang J., Arunaba G., Jeffery G. A., Rias M.: "Fundamentals of LTE," Prentice Hall, 2011
[3]. Technical Specification: "LTE; Evolved Universal Terrestrial Radio Access (E-UTRA); User Equipment (UE) radio transmission and reception", 3GPP TS 36.101 version 10.3.0 Release 10. https://www.etsi.org/deliver/etsi_ts/136100_136199/136101/10.03.00_60/ts_136101v100300p.pdf (consulté le 9 mars 2019)
[4]. Ghassan A. A., Mahamod I. and Kasmiran J.:" Modeling and Performance Evaluation of LTE Networks with Different TCP Variants". International Scholarly and Scientific Research & Innovation 5(3), pp 443-448. (2011).
[5]. Signals Research Group: "The LTE standard: Developed by a global community to support paired and unpaired spectrum deployments". https://www.qualcomm.com/media/documents/files/the-lte-standard.pdf (consulté le 9 mars 2019)
- Citation
- Abstract
- Reference
- Full PDF
Abstract: Wireless sensor networks have a wide range of potential applications to industry, science, transportation, civil infrastructure, and security. Energy efficiency and improving the network lifetime are the fundamental challenges in wireless sensor networks. Lack of centralized administration and coordinator are the reasons for wireless sensor networks to be vulnerable to active attack like black hole. The affected node, without knowing a reliable route to destination, spuriously replies to have shortest reliable route to destination and entice the traffic towards itself to drop it. Network of such nodes may not work according to the protocol being used for the routing . Use of multiple sinks can improve the data collection resulting in improved throughput, reduced delay and congestion.........
Keywords -Mobile sink, constrained path, residual energy, delay, throughput, least cost path, blackhole attack
[1]. Anil Kumar, Anil Thomas "Energy Efficiency and network lifetime maximization in wireless sensor networks using improved Ant colony optimization" IEEE 20180.
[2]. RC. Shah, S. Roy, S. Jain, and W. Brunette, "Data MULEs: Modeling a Three-Tier Architecture for Sparse Sensor Networks," Proc. Fir& IEEE Int'I Workshop Sensor Network Protocols and Applications, pp. 30 -41, 2003
[3]. S. Jain, RC. Shah, W. Brmette, G. Borriello, and S. Roy, "Exploiting Mobility for Energy Efficient Data Collection in Sensor Networks," Mobile Networks and Applications, voL I I, no. 3, pp. 32 7-339, 2006.
[4]. A Chakrabarti, A Sabharwal, and B. Aazhang, "Communication Power Optimization in a Sensor Network with a Path- Con& rained Mobile Observer," ACM Trans. Sensor Networks, vol. 2, no. 3, pp. 297-324 , Aug. 2 006.
[5]. L. Song and D. Hatzinakos, "Architecture of Wireless Sensor Network s with Mobile Sinks: Sparsely Deployed Sensors," IEEE Trans. Vehicular Technology, vol. 56, no. 4, pp. 1 826-1 836, July 2 007.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Database Security Using Multi-Shares Visual Cryptography |
Country | : | India |
Authors | : | Dr. G.D.Dalvi || Dr. Mrs.S. D. Wakde || Prof. P.V.Kale |
: | 10.9790/2834-1402013743 |
Abstract: Security is a basic need of today's digital world. The Concept stated in this paper describes utility of Visible Cryptography (VC) to the authentication of facial pictures. In proposed system, photograph of character is taken care of, once entered it is encrypted and decrypted using sterilization set of policies. In this work useful bitwise operation is performed on every pixel with the help of key which is provided by new concept of sterilization algorithm. Initially it is necessary to separate the R, G and B channel from the image and which will be encrypted on Multiple shares and later to convert the image in such way that original image form only when shares are combined in proper sequence. In current innovation, the greater part of VC is implanted as a mystery utilizing various shares.
Keywords - Bitwise operation; Multi shares; Pixel-Sharing; Sterilization Algorithm.
[1]. M. Naor and A. Shamir, "Visual cryptography," Advances in Cry ptology - EUROCRYPT'94, Springer-Verlag,1995,Vol-950, pp.1-12.
[2]. Hsien-Chu Wu ,Hao-Cheng Wang and Rui-Wen Yu" Color Visual Cryptography Scheme Using Meaningful Shares, " ISDA‟ 08,Vol ,3;pp 173-178,Nov,2008.
[3]. J. K. Mandal and Subhankar Ghatak, "Constant Aspect Ratio based (2, Visual Cryptography through Meaningful Shares (CARVCMS)". IEEE 1ST International conference on communication and Industrial application (ICCIA-2011 Paper ID 92), December 2011, pp.01-04.
[4]. Meera Kamath, Arpita Parab, "Extended Visual Cryptography for Color Images Using Coding Tables", 2012 International Conference on Communication, Information & Computing Technology (ICCICT), Mumbai, India 978-1-4577-2078-9/12 2011 IEEE.Vol4,Issue 5,Oct-2011,pp 39-46.
[5]. Yanyan Han and Haocong Dong, "A Verifiable Visual Cryptography Scheme Based on XOR Algorithm", 978-1-4673-2101-3/12/$31.00 2012IEEE.
- Citation
- Abstract
- Reference
- Full PDF
Abstract: Visual data has become a necessary element in the day-today life. With the increased usage of visual data, the threat to the data also increases proportionally. Therefore, a system is required to protect the visual data. In this paper, a method has been proposed to provide privacy protection using false color, within JPEG architecture. This becomes more beneficial in a sense that it adds on an advantage of reducing the file size, decreasing the complexity. For creating the protected file, JPEG encoding-decoding, AES encryption and zlib compression is used, which finally results in protected image as false image with metadata. For recovering the original image, the inverse process.........
[1]. Anne Oeldorf-Hirsch and S. Shyam Sundar "Social and Technological Motivations for Online Photo Sharing" Journal of Broadcasting & Electronic Media, 60:4, pp. 624-642, 2016.
[2]. Sanchita Hasija and Shruti Nagpal, ""CCTV Surveillance in Public Spaces of Delhi: Exploring the Perspectives of Youth visiting Malls and Delhi Metro,‟‟ IOSR Journal Of Humanities And Social Science Volume 23, Issue 12, Ver. 2, pp. 4-8, 2018.
[3]. Rahna P. Muhammed, ""A Secured Approach to Visual Cryptographic Biometric Template", Journal of Network Security, Vol.02, No.3, pp.15-17, 2011.
[4]. L. Tang, "Methods for encrypting and decrypting mpeg video data efficiently," in Proc. of the Fourth ACM Intl. Conf. on Multimedia. ACM, pp. 219–229, 1997.
[5]. F. Dufaux and T. Ebrahimi, "A framework for the validation of privacy protection solutions in video surveillance," in Multimedia and Expo (ICME), 2010 IEEE Intl. Conf. on. IEEE, pp. 66–71, 2010.
- Citation
- Abstract
- Reference
- Full PDF
Abstract: We present an automatic modulation recognition work for the identification of radio signals in a communication network. Our aim is to design an efficient communication system and make the receiver is capable to detect the modulation scheme of the signal it receives, using Automatic Modulation Recognition without having minimum or earlier knowledge of the transmitted signal.The work consider both SVM and ANN architectures and finally observe the efficient learning tool for recognition. Initially we classify the modulation schemes using non linear SVM. After that, we use Artificial Neural Network(ANN) for further classification of analog and digital modulations. Features were also extracted using wavelet decomposition and fast fourier transform techniques. Neural Networks were applied to the extracted features to distinguish between signals having different modulation schemes..........
Keywords - Artificial Neural Network, Modulation recognition, Support Vector Machine, Wavelet decomposition.
[1]. Wen Wei and J. M. Mendel, "Maximum-likelihood classification for digital amplitude-phase modulations," IEEE Transactions on Communications, vol. 48, no. 2, pp. 189–193, Feb 2000.
[2]. J. A. Sills, "Maximum-likelihood modulation classification for psk/qam," in MILCOM 1999. IEEE Military Communications. Conference Proceedings (Cat. No.99CH36341), 1999, vol. 1, pp. 217–220 vol.1.
[3]. Chung-Yu Huan and A. Polydoros, "Likelihood methods for mpsk modulation classification," IEEE Transactions on Communications, vol. 43, no. 2/3/4, pp. 1493–1504, Feb 1995.
[4]. A. K. Nandi and E. E. Azzouz, "Algorithms for automatic modulation recognition of communication signals," IEEE Transactions on Communications, vol. 46, no. 4, pp. 431–436, Apr 1998.
[5]. A. Swami and B. M. Sadler, "Hierarchical digital modulation classification using cumulants," IEEE Transactions on Communications, vol. 48, no. 3, pp. 416–429, Mar 2000.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Monitoring of Water Purification Process Based on IoT |
Country | : | Iraq |
Authors | : | Ibraheem M. Khalil || Hazem Noori Abdulrazzak |
: | 10.9790/2834-1402015662 |
Abstract: Water is essentially to human life and the health of the environment. To establish a good quality of water, it is required a monitoring system which developed based wireless sensor network and IoT. Wireless sensor network used to measure water quality by sensing the change of pH, TDS of water after the purification process. In this paper wireless sensor interface with microcontroller device using two nodes of NRF24L01 one of them considered to be transmitting node while the other considered to be receiving node. the status of system will send to Web with IP defined address in order to monitor the status of system numerically and graphically. The esp8266 module has been used because it is allowing microcontrollers to connect to a Wi-Fi network and make simple TCP/IP connections with wireless sensor network.
Keywords -WSN, IoT, pH sensor, TDS sensor, microcontrollers, water purification
[1]. S.u.Rehman, Z. Hussain, S. Zafar, H.Ullah, S.Badshah, S. S. Ahmad and J.Saleem, Assessment of Ground Water Quality of Dera Ismail Khan, Pakistan, Using Multivariate Statistical Approach, Science, Technology and Development. 2018, 4(37): 173-183.
[2]. L.Nahuelhual, G.Saavedra, F.Henríquez, F.Benra, X.Vergara, C.Perugache and F.Hasen,Opportunities and limits to ecosystem services governance in developing countries and indigenous territories: The case of water supply in Southern Chile, Environmental Science & Policy. 2018, 86:11-18.
[3]. R.Murugan and C.G. Ram, Energy efficient drinking water purification system using TiO2 solar reactor with traditional methods,Materialstoday Proceeding.2018, 5(1):415-412.
[4]. G. Burleson, N. MacCarty, K. Sharp and B. Tilt, An Interdisciplinary Mixed-Method Approach to the Evaluation of a Novel Water Treatment Technology in Eastern Uganda, ASME. International Design Engineering Technical Conferences and Computers and Information in Engineering Conference .2018, 2B:1-11 [5]. E. L. Marron, W. A. Mitch , U.V.Gunten and D.L. Sedlak,A Tale of Two Treatments: The Multiple Barrier Approach to Removing Chemical Contaminants During Potable Water Reuse, American Chemical Society . 2019:615-622..
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | A Study on the Increasing Trend of Electronic Chips in Industry |
Country | : | |
Authors | : | Girija.G. Mangalagatti |
: | 10.9790/2834-1402016365 |
Abstract: Intricacy of integrated circuits has roughly multiplied each year since their presentation. Cost per function has diminished a few thousand-overlay, while framework execution and dependability have been improved significantly. Numerous parts of handling and plan innovation have added to make the production of such functions as perplexing single chip microchips or memory circuits monetarily plausible. It is feasible to break down the increment in intricacy into various elements that can, thusly, be inspected to perceive which commitments have been significant in this development and how they may be required to keep on advancing. The normal patterns can be recombined to perceive how long exponential growth in intricacy can be required to proceed. The current paper highlights the increasing trend of electronic chips in industry.
Keywords -Electronic, Chip, Power
[1]. S. Wolf and R.N. Tauber, Silicon processing for the VLSI era- Vol.1 Process Technology, (Lattice Press, Sunset Beach, CA, 2016), p.603
[2]. M.H. KibeI and P.W. Leech, Surface and Interface Analysis, 24, 605, (2016)
[3]. A.E. Morgan: in Characterisation of semiconductor materials: principles and methods ed. by G.E. McGuire, (Noyes Publications, NJ, 2014), 49
[4]. C.J. Palmstrom, and D.V. Morgan, in Gallium Arsenide, Materials, Devices and Circuits, Eds. M.J. Howes and D.V. Morgan, (J. Wiley and Sons), 195, (2015)
[5]. P.W. Leech, G.K. Reeves, W. Zhou and P. Ressel, J. Vac. Sci. Techno!., B16(1), 227, (2016)