The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this paper a parametric study for the designing of Planar Inverted F Antenna (PIFA) for handheld devices has been proposed. The total dimensions of the proposed antenna including the ground plane are 37mm × 35mm × 5mm, which are suitable to be operated within the mobile handheld devices. A conceptual study has been performed on various parameters such as width of shorting plate, dimensions of ground...
There is an upsurge for miniaturized antenna that covers maximum number of frequencies in the communication technologies. Fractal antennas have been pondered as a promising field due to space filling and self repetitive properties. In this presented paper a study is made on modified Koch geometry to obtain multiband behavior. It is observed that rise in each level of iteration, results in increase...
Compact and multiband antennas are effectively demanded in wireless handheld devices for multiband operations. The design of multiband Planar Inverted-F Antenna (PIFA) for mobile handheld or portable devices applications is presented in this paper. The designed antenna comprises of a rectangular planar element placed above the Rogers Duroid 5880 substrate. The ground plane resides at the bottom side...
This paper provides a scheme where the security algorithms of steganography would provide a very high level of security when applied over the web authentication. The usage of image processing algorithms would provide a very high security as compared to the existing methodologies. Application of steganography would also be substitute to the biometric and RFID tokens. The authors provide a procedure...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.