The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In sensor network deployed sensor nodes send data to the sink node. Set of different kind of sensor nodes called sensor network. This paper shows the behavior and performance of FMAC Protocol for different reporting rates. Results for packet delivery ratio, packet loss ratio, average throughput, average energy consumption, Average end-to-end delay and control overheads shows as graphical representation...
Present study of electric and magnetic fields should involve many new techniques to improve understanding and interest among new learners in this area. Keeping this in mind, we studied the origin of study from coordinate notations. Three commonly used coordinates systems are namely; Cartesian, Cylindrical and Spherical coordinate system. In Cartesian coordinate system notations for representing any...
In today's world, there is a growing need for surveillance in order to maintain the decorum at a place and ensure the safety and security of its people. An aerial surveillance system will be worthwhile in this regard. This paper describes how an aerial surveillance system can be built using an unmanned aerial vehicle or a drone. We start by delineating the features of our aerial surveillance system...
In this paper we have modeled a ultra-wideband 4×1 modified Vivaldi antenna array using the software HFSS for GPR applications. A one to four Wilkinson's power divider was designed to form the feed network for the antenna array. We have obtained ultra-wideband characteristics ranging from 1.19 GHz–9.62 GHz and multiband characteristics with frequency bands 9.92 GHz–12.33 GHz, 12.63 GHz–13.43 GHz,...
A Virtual Private Network (VPN) is a technology that is used to securely connect private network passing through a public network such as the Internet. Using a VPN, a computer, tablet, or smartphone is able to securely connect with others in the Internet as if they were part of a private network. Using this technology may also bring security threats like spoofing, snipping, and hacking as the data...
In an all-optical WDM network; optical fibers are used to transmit data followed by WDM technology. An optical fiber carries light along its length path at high rates and with little loss. Several wavelengths on a single fiber can be used to transfer data, when using wavelength-division multiplexing. In this way, several data transmissions at very high speed can take place on a single fiber. The routing...
Nano doped Liquid Crystals are thermo tropic exhibiting various phase transitions under the influence of electric field. The molecules behave differently at each phase. The parameters like refractive index, optical polarization, dielectric constant, switching times and other physical parameters are different in different Liquid Crystal Phases. For the purpose of studying the electro-optic properties...
Rader abd Brenner's ‘real-factor’ FFT can be applied to Radix-4 FFT to fetch saving in the multiplication counts. However in turn the number of addition count increases which results in increase in total flop count. For this in this paper two levels of saving ideas are proposed. First is a slight modification to Rader and Brenner's ‘real-factor’ FFT for Radix-4, which not only reduces the multiplication...
A microstrip patch antenna is a planar directional antenna in which a metal patch is placed on top of a dielectric substrate which in turn is placed on top of a metal ground plane. The power transfer between a source and antenna is done through a feed line. In general, the characteristic impedance of a transmission line is 50 ohms. By maximum power transfer theorem, the patch antenna should be fed...
TRAVEL PORTAL is an android project used for acquiring information about particular city's hotels, restaurants, historical places, etc. It will also provide the current location of the user. This application will also be used by travelling agencies to manage their customer trips, acquire information, etc. This application will provide notepad to add important task to do. It will also provide help...
One of the conventional ways of dispersing information in a university or corporate office is through the Notice Board. Notice boards are an ideal platform that allows one to put up information so that it can be seen by everyone. Whenever there is a new circular to be dispersed among the students or employees, it will be immediately put up on the notice board where everyone has to manually gather...
MANET is a dynamic network which is used extensively today due to its diverse applications in several fields like military battlefield, disaster relief operations, etc. Since MANET has a mobile topology, the position of every node keeps changing from time to time. Hence, during data transmission, several nodes enter and leave the network. As a result, MANETs are vulnerable to several attacks in which...
Nowadays wireless sensor network (WSN) plays an important role in every field of technology. Data collection is a major issue in WSN because the data has to be collected in a way that maximizes life time of WSN, minimizes the energy consumption and gives shortest path in case of mobile sinks. In this paper we divide the whole network into grids. Certain grids are critical (e.g., during a terror strike)...
Hardware Trojan (HT) is an intentional and the undesired modification of the integrated circuit (IC) and major security issue for the semiconductor industry. HT alters the normal working of IC, can leak the secret information or may damage the IC permanently. Due to the small size of the devices on IC, detection of trojan is very difficult by normal testing methods. In this paper, a side channel based...
In our current tourism system, whenever a tourist visits a monument or a famous spot, to know more about the place, he/she hires a guide. With the advancement in the technology, the role of the guide is being taken up by the different services and applications. The increase in the use of mobile phones has made it easier to provide different applications available to the tourists ‘on the go’. In this...
Mobile Adhoc Network (MANET) is extremely susceptible to more attacks owing to its characteristics such as mobility and dynamic topology changes. In particular, routing process in MANET is aimed by more adversaries for various attacks to ruin the data transmission. In this paper, we introduce a combined technique for attack monitoring and risk assessment in MANET routing. The proposed solution chooses...
Flower shaped antenna along with a rectangular resonator is reported in this paper for THz applications. The dimension of antenna is 20 × 30×1.6 mm3. FR4 material is used as substrate. Return loss, radiation pattern and gain of the antenna are presented and analyzed to study the performance of the antenna for THz applications. The frequency band is obtained at 0.92 THz with the impedance bandwidth...
In this paper, a miniaturized rat race coupler with stub loaded transmission lines is proposed to operate at WLAN 1 frequency i.e., 2.4 GHz. A comparative analysis has been made by replacing the conventional quarter wavelength transmission lines by stub loaded transmission lines. The proposed model has been designed on RT Duroid /5880 substrate and simulated using AWR Design Environment. Subsequent...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.