Proceedings of the Conference on Advances in Communication and Control Systems-2013

+ Advanced search
143 articles

Performance Analysis of Pre-detection and Post-detection Diversity reception schemes for Mobile Satellite Systems.

Sonika Singh, Sandip Vijay, Gagan Singh
For mobile satellite systems, quality of service and service availability depend on the line-of-sight satellite availability. The satellite visibility is one of the major factors which influence satellite link availability, since the satellite channel behavior is depended on the link conditions between...

Performance Analysis of Reduced Order Aircraft Bank Angle Control System

Naafees Ahmed, Gagan Singh, M. Samir, Hussain Ahmad
Order reduction is very important issue in control system. Analysis, simulation and response of a lower order system are simple and fast. So in this paper, a simple but very effective approach based on Routh Criterion is used to determine reduced order model of an unstable open-loop system. Aircraft...

Low Cost Hardware Design of a Web Server for Home Automation Systems

Sandeep Patel, Punit Gupta, Mayank Kumar Goyal, Alok Agarwal
In the present scenario the world is moving towards automated systems. To design a hardware which is able to interact via internet is a challenging task in design of any automation system. A new term known as ’Internet of things’ also faces the same kind challenge, of interfacing a dumb electronic terminal...

Tracking of Ballastic Missiles and Velocity Measurement using Frame Distance Manipulation

Vimal Kumar Mishra, Kumar Rajeev Ranjan
In order to measure the velocity of a missile, several models have been discussed in this paper. It deals with the tracking and following of single/multiple missile in a sequence of frames and the velocity of the missile is determined. Algorithms have been developed for improving the image quality, segmenta-...

Lightweight Trust Aggregation Through Lightweight Vibrations for Trust Accumulation in Resource Constraint Mobile Ad Hoc Networks (MANETs)

Adarsh Kumar, Krishna Gopal, Alok Aggarwal
Evaluating the trust of participating entities increases the security and collaboration among members. This work presents the trust accumulation schemes using lightweight vibration signals. In all scenarios virtual nodes are considered to create subgroup in close vicinity. It is observed that trust accumulation...

Analysis of Multilayered Microstrip Patch Antenna

Anurag Vidyarthi,, Sribidhya Mohanty,, Sumit Tripathi,, R. Gowri, B.S. Jassal
In this paper analysis of multilayered antenna is done by considering two approaches in which stacked patch is realized with common dielectric and in other approach stacked patch is realized with different dielectric substrates. Both the approaches are analyzed commonly with 10% reduction in dimensions...

Design and Analysis of Annular Ring Slot MSA for wireless and UHF Applications

Padam Singh, D.C. Dhubkarya, Alok Aggrawal
In this paper the design and analysis of annular ring slot microstrip antenna is presented. The design frequency of antenna is 2.1 GHz and used substrate for the fabrication of the proposed antenna is FR4. After simulation and testing return losses of about -14 dB, -14 dB, -19 dB and -10 dB are obtained...

Performance of a Swastik Shape Microstrip Patch Antenna With Wide Bandwidth

Beena Beena, Paritosh Kumar, Amit Kumar Gupta, R.K. Prasad
In this paper, a novel swastik shape microstrip patch antenna with enhanced bandwidth is presented and discussed. The proposed design offers low profile,enhanced bandwidth and compact antenna element. The maximum gain is 3.61 dBi at 2.5 GHz, antenna efficiency is 88.20% while the radiation efficiency...

Mobile Agent Migration Strategy using Itinerary Graph and Neural Network

Nripesh Chauhan, Manjeet Singh
Mobile agents (MA) needs to migrate to several host to accomplish its task .Migration strategy is responsible for planning out an optimal migration path ,which ensures mobile agent to complete its task correctly and efficiently at the minimum cost .This paper describe the strategy adopted by a mobile...

Design And Optimization of Low Frequency Pushing Circuit in Voltage Controlled Oscillators

Rajeev Mishra, S.K. Singh
A low frequency pushing wide frequency tuning range Radio frequency (RF) voltage – controlled Oscillator (VCO) in 0.35 m standard CMOS prosed for wireless applications is presented. It is different from all conventional designs primarily in the way it is biased. The measurement results show that the...

Mobile Applications -Vulnerability Assessment Through the Static and Dynamic Analysis

Sreenivasa Rao Basavala, Narendra Kumar, Alok Aggarwal
In the recent day’s mobile applications usage is increasing by banking and financial institutes, health and hospital management systems such as mobile banking apps, e-commerce apps, news feeds, inpatient and outpatient information, social networking apps and game apps etc. All these mobile applications...

Performance and Sensitivity Analysis of Path Loss Models for WiMAX Signals

Rahul Pathak, Mohit Katiyar
The paper depicts investigation related to path loss estimation and overall performance of both theoretical and experimental propagation models. Performance of propagation models namely, SUI, Okumara-Hata and COST- 231 has been analyzed and compared with the experimental results obtained for frequency...

Handwriting Recognition: A Progressive Elimination Approach

Vaibhav Mittal, Sushant Kumar Singh
In this paper, a new offline pattern recognition method has been presented, as a need for time management in lower order real time systems has been felt. The paper aims to present an algorithm for recognition of patterns in need-based applications where the focus has been laid on matching and eliminating...

Advanced Applications using Cooperative Wireless Networks

S.R. Dikondwar, Gautam Chopra
In this paper, we propose Advanced applications in prominent fields such as Agriculture, Biomedical & Telemetry, Electronics & Telecommunications, Defence and Satellite communications using cooperative communication. The single sensor or array of sensors are interfaced with hard wire or wireless sensor...

ZIGBEE Based Parameter Monitoring and Controlling System for Induction Machine

Mohit Kumar, Mohnish Sharma, Rishabh Narayan, Sumit Joshi, Sanjay Kumar
Nowadays the automation has become a basic need for the industries. Induction Motors are the nerves of many industries. Hence Industrial automation is required for precise and accurate operation. This paper proposes a wireless control and monitoring system for an induction motor based on Zigbee communication...

Implementation of the technique of Space minimization for Counting Sort algorithm

Sanjeev Kumar Sharma, Prem Sagar Sharma
Today we consider the question of whether it is possible to sort without the use of comparisons. They answer is yes, but only under very restrictive circumstances. Many applications involve sorting small integers (e.g. sorting the employees according employee Id, sorting the list of students according...

An Automated Technique for Criminal Face Identification Using Biometric Approach

Jyoti Nautiyal, Shivali Gahlot, Pawan Kumar Mishra
Face recognition has become a popular area of research in computer vision, it is typically used in network security systems and access control systems but it is also useful in other multimedia information processing areas. One of its application is criminal face identification. Criminal record generally...

Spiral-shaped High Isolated Monopole MIMO/Diversity Antenna for Small Mobile Terminals

Hari Shankar Singh, Gaurav Kumar Pandey, Pradutt Kumar Bharti, Manoj Kumar Meshram
In this paper a spiral-shaped monopole like MIMO/Diversity antenna is proposed for mobile handsets. The proposed MIMO antenna covers the frequency bands LTE700 (777-787), GPS-L1 (1565-1595), and WLAN (2400- 2480). The isolation between ports is below -20dB for LTE, -21dB for GPS-L1, and -18 dB for WLAN...

A Novel Small-Size Quad Band Internal PIFA for GPS L1/Bluetooth/LTE2500/WiMAX/HIPERLAN1 Applications

Mayank Agarwal, Rajesh Singh, Manoj K. Meshram
A novel quad band planar inverted F-antenna along with an added resonating copper arm working in GPS L1/Bluetooth/LTE2500/WiMAX/HIPERLAN1 is presented. The proposed antenna occupies a volume of 25 x 10 x 5.8 mm3 over the mobile circuit board. Parametric investigations of some important parameters are...

Kerberos Based Secure Communication in Wireless Sensor Networks

Kriti Jain, Upasans Bahuguna, Neeti Bisht
The wireless sensor network is an emerging field that combines sensing, computation, and communication into a single tiny device. As sensor networks frame closer towards well-known deployment, security issues become a vital concern. So far, much work has focused on making sensor networks realistic and...

A CPW-fed Broadband Swastik Shape PIFA for WiMAX (3.5 GHz) Application

Ramesh Patel,, Jagannath Malik, Kumar Goodwill, M.V. Kartikeyan,, R. Nath
A cpw-fed Swastik shape Broadband planar inverted f antenna (PIFA) for WiMAX application has been proposed. Broadband operation (3.27 GHz to 4.02 GHz) is achieved by proper broadband matching at both the resonances (resonance due to even mode and resonance due to odd mode) due to modified cpw feed. Proposed...

Coverage and Analysis of Obstructed Indoor WLAN using Simulation Software and Optimization Technique

Leena Arya, S.C. Sharma
WLAN is a flexible data communication system implemented as an extension to or as an alternative for, a wired LAN. This paper presents the placement of access points (AP) as a nonlinear optimization problem. The work explores the measured data in terms of signal strength in the indoor WLAN 802.11g at...

Deploying A Private Cloud Go Through The Errors First

Prachi Despande, S. C. Sharma, Sateesh K. Peddoju
Deploying cloud for research purpose is quiet time consuming when different errors have to be eliminated. This paper lists out common problems and errors encountered while deploying private cloud and the possible solutions to these problems and errors. It will help beginners to minimize the time to setup...

Performance Analysis of IEEE WLAN 802.11a in Presence of Different FEC

Jaspreet Kaur, Manish Jaiswal, Anuj Kumar Sharma, Vikash Singh, Udit Gupta
IEEE 802.11a, Wireless Local Area Network (WLAN), is a wireless broadband technology, which is used as substitute of wired Ethernet as well as in public hot sport wireless network because of its higher data rates compared to cellular mobile networks. In order to provide higher data rate and to mitigate...

A Survey on Spectrum Sensing Techniques for Cognitive Radio

Manish Jaiswal, Anuj Kumar Sharma, Vikash Singh
Natural frequency spectrum is scared resource; the efficient use of it can only accommodate the need of future computing world. But efficient use of it is not possible within the existing system, where the allocation of spectrum is done based on fixed spectrum access (FSA) policy. Many surveys show that...

Finding Optimal Tour Length of Mobile Agent in Wireless Sensor Network

Anil Kumar Mahto, Ajay Prasad, Hemkumar D., Prity Kumari
Recently, research interest has increased in the design, development, and deployment of mobile agent systems in a wireless sensor network (WSN). Mobile agent systems employ migrating codes to facilitate flexible application re- tasking, local processing, and collaborative signal and information processing....

Controlling of D.C. Motor using Fuzzy Logic Controller

Husain Ahmed, Gagan Singh, Vikash Bhardwaj, Saket Saurav, Shubham Agarwal
Abstract: Most of the industrial controllers in use today utilize PID controllers. In this paper four methods for tuning of a PID controller are compared. A mathematical model of the most commonly used dynamic system i.e., a d.c. motor is derived and a PID controller is used in conjunction to it. Ziegler-Nichols...

Providing Security to Cloud Computing through MAC

Paridhi Singhal, Niranjan Lal, Manoj Diwakar
Cloud computing is the use of computing resources (hardware and software) that are delivered as a service over a network (typically the Internet). The name comes from the use of a cloud-shaped symbol as an abstraction for the complex infrastructure it contains in system diagrams. Cloud computing entrusts...

Survey and Taxonomy of Soft Handoff in 3rd Generation CDMA based System

Shalini Aggarwal, Shiv K. Tomar, Alok Aggarwal, Sanjeev Sharma
During handoff an ongoing call is transferred from one cell to another as a user moves through the coverage area of a cellular system. This paper presents an overview and critical analysis of published work over handoff performance both in uplink and downlink direction. Further it discusses with future...

Performance Analysis of Spread Spectrum Techniques

Astha Singh
In this paper we had analyzed the spread spectrum techniques in a broader sense, in context of their performance. Spread spectrum is an increasingly important form of encoding for wireless communications. It can be used to transmit either analog or digital data, using an analog signal. The basic idea...

The Role of Information Technology in Knowledge Management

Mitali Chugh, Neeraj Chugh, Agarwal Punia, Agarwal D.K.
Knowledge is a vital resource for corporate competitiveness and there are number of information technology solutions that provide support to knowledge management. One of the relevant issue to be discussed is- Role of IT in success or failure for implementation of KM. The purpose of this study is to explore...

Marker-less Detection of Virtual Objects using Augmented Reality

Prakhar Kapoor, Usama Ghufran, Manan Gupta, Alok Agarrwal
We present marker less camera tracking and user interface methodology for readily inspecting augmented reality (AR) objects in wearable computing applications. Instead of markers, human hand is used as a distinctive pattern that almost all wearable computer users have readily available. We present a...

Power Quality and Consumption Analysis Using Power Quality Analyzer

Siddharth Rautela, Gagan Singh
The paper presents a quality analysis of the power of Dehradun Institute of Technology. Aspects such as magnitudes and phases of voltages and currents of all phases, power factor, voltage and current harmonic content, dips and swells, frequency stability, and inrush current were taken into account. These...

Performance analysis of DYMO and Bellman Ad hoc Routing Protocol for various Battery models in MANET using Qualnet

SANJAY KUMAR MAURYA, SEEMA RAHUL, YASHI RAJVANSHI, SANDIP VIJAY
It is a challenge area in the field of ad hoc networks to support prioritized routing for time sensitive applications, such as multimedia communications, IP telephony and interactive games. However the existing protocols did not consider the special battery discharging behavior of wireless devices. The...

Performence Comparison of DSDV, AODV and DSR for Mobile Ad HOC Network by Varying Network Size

Priyanka Jangir, Saurabh Mishra
Mobile Ad Hoc network (MANET) is a collection of mobile nodes connected through a wireless link resulting in formation of temporary network without any assistance from existing infrastructure or any kind of centralized administration. The performance of an Ad Hoc network depends on the kind of routing...

VHDL Implementation of a prototype switching system

Prashant Rai, Anuj Kumar Sharma, Gaurav Verma, Varun Kumar Kakar
Switching system implies data transmission between two communicating entities. This transmission can be either via trunks or it can be completely wireless, technically termed as Telephone Switching and Mobile switching, respectively. We report the implementation of a switching system using very high...

Electricity Generation through Road Ribs using law of Electromagnetic Induction

Parul Bisht, Rajni Rawat
Recognizing the importance of developing renewable energy resources, the Highways Agency commissioned a preliminary scoping study in 2001 to explore available methods and assess the possibility of renewable energy generation being exploited within the highway network. Among the various means of transportation,...

Adaptive License Plate Detection

Pramod U. Chavan, Parag Kulkarni, Amit Khandebharad, Dattatray Khope
License plate detection process can be divided in two parts 1] plate extraction, 2] character segmentation. License plate detection relies on illumination conditions, background and mainly on camera resolution. There is absence of any common standard to compare various algorithms for a LPD system, because...

Ventricular Premature Beat Detection in ECG using Correlation Techniques

Shahanaz Ayub, J. P. Saini
Correlation techniques are used to find whether the electrocardiogram (ECG) is normal or abnormal. These correlation techniques could be further used to detect the type of abnormality present in the abnormal ECG. Reference ECG signals could be stored for all type of abnormalities and the test ECG signal...

Comparative analysis of Microstrip Patch Antenna using different substrate and observe effect of changing parameter at 5.4 GHz

Brajlata Chauhan, Sandip Vijay, S.C. Gupta
In this paper, an attempt has been made to design Edge Feed Microstrip , VSWR, phase chactersrtics and observed effect of different parameter by hanging height for all substrate in terms of return losses. The matching act as high radiator for low dielectric and low radiator for high dielectric

Analysis of LMS Algorithm in Wavelet Domain

Pankaj Goel, Sonam Rai, Mahesh Chandra, V.K. Gupta
In this paper Time Domain Least Mean Square (LMS) algorithm and Wavelet Transform Domain Least Mean Square (WDLMS) algorithm with Daubechies wavelets are used to minimize the undesired noise from speech signals. The performance of this algorithm using different Daubechies wavelets db1, db5 and db10 are...

A Novel Static Clustering Scheme for Energy-efficient Routing in Wireless Sensor Network

Rakesh Kumar Saini, Sandip Vijay
Low-Energy Adaptive Clustering Hierarchy (LEACH) is one of the most popular distributed cluster-based routing protocols in wireless sensor networks. Clustering algorithm of the LEACH is simple but offers no guarantee about even distribution of cluster heads over the network. LEACH doesn’t ensure even...

Analyzing Impact of TDMA MAC Framing Structure on Network Throughput for Tactical MANET Waveforms

Bhupendra Suman, LC Mangal, SC Sharma
With the advancement of networking technology it is anticipated to have Internet like functionality in tactical network. However, unlike commercial network the tactical networks operate under severe environment and resources constraints. Moreover, the MANET architecture and shared resources of wireless...