Saturday, 7 December 2013

Performance Assessment For Alamouti Coding Technique For Rayleigh Fading Channel

Vol.2  No.3

Year: 2013

Issue: May-Jul

Title : Performance Assessment For Alamouti Coding Technique For Rayleigh Fading Channel

Author Name : Hemlata Sinha, M.R. Meshram , G.R. Sinha

Synopsis :

Space-Time Coding (STC)transmits and receives information at higher data rates with more reliability by using multiple antennas at both sides. In this paper, Multiple-Input–Multiple-Output (MIMO) systems with reduced complexity and the space–time block coding, for communication over Rayleigh fading channels using multiple transmit antennas have been considered. We have tested the performance of Alamouti coding technique for the Rayleigh channel. The signals on the transmit (Tx) antennas at one end and the receive (Rx) antennas at the other end are “combined” in such a way that the quality (bit-error rate or BER) or the data rate (bits/sec) of the communication for each MIMO user are improved. The simulation results are used to analyze and compare the performance.

Design Of Ds-Cdma Transceiver For Monitoring And Controlling A Boiler In Power Plant Industries

Vol.2  No.3

Year: 2013

Issue: May-Jul

Title : Design Of Ds-Cdma Transceiver For Monitoring And Controlling A Boiler In Power Plant Industries

Author Name : Kuzhaloli.S, K.S. Shaji

Synopsis :

Even though wireless communication has crossed 3G, today many of the industries transmit and receive data only by means of wired technology. In order to improve the performance of the power plant industry, wireless data transmission is introduced by designing a DS-CDMA transceiver. DS-CDMA is one type of spread spectrum communication, in which multiple single channels use different codes for communication. This paper proposes the design of a DS-CDMA transceiver with gold codes, tailored for the boiler data communication, to monitor and control the parameters of the boiler in the power plant. The process parameters of the boiler unit include mainly the Lignite Flow, Feed Water Flow, Steam Flow, Super Heater Spray Flow. The designed transceiver system is verified with real-time input data collected from the power plant and the BER performance is obtained. The simulation is performed using Matlab software.

Efficient Fractal Image Compression Using Parallel Architecture

Vol.2  No.3

Year: 2013

Issue: May-Jul

Title : Efficient Fractal Image Compression Using Parallel Architecture

Author Name : Vikas Dilliwar, G.R. Sinha , Shrish Verma

Synopsis :

Digital representations of images usually require a very large number of bits. It is important to consider techniques for representing an image with fewer bits. In this context, we present a survey of Fractal image compression with parallel encoding scheme. The Fractal image compression (FIC) is a novel technique in the field of image compression that utilizes the existence of self symmetry of the image. The unique feature of the fractal image compression technique is its very good compression ratio, high decompression speed, high bit-rate and resolution independence. However, this technique of image compression requires large encoding time. We propose a parallel computing architecture to reduce the computational cost that is associated with encoding phase. We have discussed fractal image compression, Iterative function system and different encoding schemes along with their reviews. We have also suggested the concept of parallelization to be applied in compression methods for efficient implementation.

Speedy Reminiscence Depiction Scheme Intended For Transmitter And Receiver Parts Of Processors

Vol.2  No.3

Year: 2013

Issue: May-Jul

Title : Speedy Reminiscence Depiction Scheme Intended For Transmitter And Receiver Parts Of Processors

Author Name : saisudheer amba

Synopsis :

Today's microprocessors have need to operate at very high IO speed to cater the ever increasing computation need, so characterizing these IO's in a quick efficient and accurate manner is needed for us. The paper involves studying Transmitter( T ) and Receiver ( Rr ) blocks of memory interface of CPU and develop methods to characterized these IO's, X suitable feedback to design is provided after analyzing the data and receiving with design. In this paper involves some analog analysis and design. Here it needs some software tool to implementation. This paper implements new method to increase the speed of the IO operations of the memory interface of CPU. This contain the usage of the NIDAQ6008 and analog design and the circuit design concepts and here it deals with the calculation of the Rterm, Pull-up, Pull-down resistors and Jitter and the de-embedding of the signal loss.

Factors That Influence User Preference In The Mobile Telecommunication Industry In Ghana

Vol.2  No.3

Year: 2013

Issue: May-Jul

Title : Factors That Influence User Preference In The Mobile Telecommunication Industry In Ghana

Author Name : ABDUL-MUMIN SALIFU

Synopsis :

This paper analyzed the user preference in the mobile telecommunication industry of Ghana. A study across the ten regions of Ghana, sought to find out the singular of multiple factors that influence users to subscribe to a particular network. The study also sought to reveal whether age, educational status and income level had any association or correlation with the choice of network. The paper revealed that there was no association between age, educational status and the selection of preferred network but rather a stronger correlation or association existed between the income level and the choice of network.

Trusted E-Contracts In Collaborative Intra-Cloud Business-To-Business environments

Vol.2  No.3

Year: 2013

Issue: May-Jul

Title : Trusted E-Contracts In Collaborative Intra-Cloud Business-To-Business environments

Author Name : Sufyan T. Faraj, Waleed Kareem Awad , KashifKifayat

Synopsis :

Cloud computing is designed to provide services to the end users and to the owners of organizations over internet with little cost and with little configuration effort. There are many concerns about cloud computing especially in terms of security, privacy, and trust. These main issues have prevented business from fully accepting cloud platforms. Some of the confidential Business-to-Bussiness (B2B) collaborations require secure tunnels to secure the messaging between the services that are deployed within the same cloud. As organizations participating in B2B collaborations deploy their services in single or multiple clouds, businesses face security threat to their sensitive data both from outside and inside the cloud. This work is proposed to contribute in solving such problems. This paper presents an electronic contract (econtract) based solution that provides a secure Connectivity as a Service (CaaS) for intra-cloud communications. Our proposed model interestingly handles secure messaging for the services deployed within the same cloud. The basicinterction model has further been enhanced by adding a new service layer (Authentication Service) which is responsible for offering a high level of trust between collaborating parties by preventing any unauthorized party from joining the connectivity service. Indeed, our proposed system can prevent any involved organization from launching masquerade attacks. The added layer basically facilitates the integration of the basic model with the Public-Key Infrastructure (PKI). The proposed system can also be helpful in solving other attacks such as man-in-the-middle attack and modification of the messages attack.

Thursday, 12 September 2013

Early Start For Careers in Telecom Industry

Vol.2  No.2

Year: 2013
 
Issue:
Feb-Apr

Title : Early Start For Careers in Telecom Industry

Author Name : Rishi Kappal 

Synopsis :

The Indian Telecom Sector is expected to generate revenue of ` 378,000 crores (2010 to 2016)[1],putting it on a growth trajectory. Of this revenue, the Indian handsets industry will be anywhere between ` 30,000 to ` 35,000cr which is 10-12% of the total telecom revenue[2]. The Indian Telecom Sector remains a significant contributor to GDP and employs close to 10Million people (3 million directly and 7 million indirectly)[3]. Over the next decade, this sector is expected to double the employment of people and hence make it one of the most lucrative industries to aspire for a successful career. Indian telecom employment will be on a continuous rise. However, the Indian education system doesn't provide for a telecom led vocational skill and hence the need for students to start early for a career in telecom. The DGET (Director General of Employment and Training) has already released basis operating standards for skill development initiatives targeting Telecom Sector[4] and is being furthered by TSSC (Telecom Sector Skills Council). This paper will provide insights about the elements of telecom ecosystem that in turn opens up multiple career opportunities and the capabilities required for a career in individual telecom ecosystem element.

HDL Based Illumination Invariant High Performance Face Detection System for Mobile Applications

Vol.2  No.2

Year: 2013
 
Issue:
Feb-Apr

Title : HDL Based Illumination Invariant High Performance Face Detection System for Mobile Applications

Author Name : suguna tangimi, yarraballi mahesh

Synopsis :

Illumination variation is a big problem in face detection which usually requires a costly compensation prior to classification. To avoid this problem we are proposing a method for face detection irrespective of illumination variations. In this context the contribution of the work is twofold. First we introduce illumination invariant Local Structure Features for face detection. For an efficient computation we propose a Modified Census Transform which enhances the original work of Zabih and Wood [10]. Secondly we introduce an efficient face detection classifier for rapid detection to render high performance face detection rate. The Classifier structure is much simpler because we use only single stage classifier than multi-stage approaches, while having similar capabilities. The combination of illumination invariant features together with a simple classifier leads to a realtime processing[12]. Detection results are presented on two commonlyused databases namely BioID set of 1526images and Yale face data base set of 15 people with 11 images for each .We are achieving detection rates of about 99.76% with a very low false positive rate of 0.18%In this paper, we are also proposing a novel hardware architecture of face-detection engine for mobile applications. Here MCT (Modified Census Transform) and Adaboost learning technique as basic algorithms of face-detection engine. The face-detection chip is developed by verifying and implementing through FPGA and ASIC. The developed ASIC chip has advantage in real-time processing, low power consumption, high performance and low cost. So we expect this chip can be easily used in mobile applications.

Analysis of Pcg Signals Using Daubechies Wavelet Family

Vol.2  No.2

Year: 2013
 
Issue:
Feb-Apr

Title : Analysis of Pcg Signals Using Daubechies Wavelet Family 

Author Name : ANITA DEVI, Abhishek Misal, G.R. Sinha 

Synopsis :

The authors have analyzed a Bio-medical system for normal and abnormal heart sound identification based using Discrete Wavelet Transform (DWT) which is very useful in diagnosis of heart diseases. Due to the presence of sampling frequency components, the wavelets have a different decomposition level and therefore for better performance for a particular heart sound, DWT (Daubechies family) is applied up to 10 levels to extract the features for the individual heart signal. One dimensional feature extraction is obtained by evaluating the search parameters such as maximum energy, maximum variance, maximum entropy, and the analysis using these parameters provide best wavelet for determining suitable features of phonocardiaogram (PCG) signals.

Agent Based Study on Multicast Routing In Adhoc Environments

Vol.2  No.2

Year: 2013
 
Issue:
Feb-Apr

Title : Agent Based Study on Multicast Routing In Adhoc Environments

Author Name : ARANGANATHAN A, C.D Suriyakala 

Synopsis :

Multicast is communication between a single sender and multiple receivers on a network. Multicast routing in Mobile Ad hoc Networks (MANETs) poses several challenges due to inherent characteristics of the network such as node mobility, reliability, scarce resources, etc. There are many protocols that can help multicast data transmission. Agent based multicast routing is one of the ways to achieve multicast routing in an efficient manner. There are lot of concerns and challenges in adhoc environment in multicast routing like tree based or mesh based, mobility manner, and traffic in the adhoc environment. An Agent can be hardware or software program and it can be used to get routing information, source and destination nodes information. The desirable character is to reduce flooding of packet, minimum end to end delay and maintain reasonable packet delivery ratio. Three agent based protocols are taken from different environment and studied by their working nature of their agents. The protocols are ASSM, MAMR and ABMRS. Analysis the natures and limitations of these protocols helps to understand agents in an adhoc network and identify the base for agent based multicast transmissions.