Pub Date : 2014-04-03DOI: 10.1109/ICCSP.2014.6950009
Jayant Mankar, P. Malviya
To analyze lung sound by auscultation method requires substantial clinical experience, a fine stethoscope and good listening skills. The lung itself cannot generate sound if there is no airflow; pressure differences between structures within the thorax. The type of lung sound can be known by listening to the lung sound. The timing, repeatability and shape of crackles are important parameter for diagnosis. In this paper, we aim to detect and classify crackle to find deformities in lungs.
{"title":"Analysis of lung diseases and detecting deformities in human lung by classifying lung sounds","authors":"Jayant Mankar, P. Malviya","doi":"10.1109/ICCSP.2014.6950009","DOIUrl":"https://doi.org/10.1109/ICCSP.2014.6950009","url":null,"abstract":"To analyze lung sound by auscultation method requires substantial clinical experience, a fine stethoscope and good listening skills. The lung itself cannot generate sound if there is no airflow; pressure differences between structures within the thorax. The type of lung sound can be known by listening to the lung sound. The timing, repeatability and shape of crackles are important parameter for diagnosis. In this paper, we aim to detect and classify crackle to find deformities in lungs.","PeriodicalId":149965,"journal":{"name":"2014 International Conference on Communication and Signal Processing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2014-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127721011","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-04-03DOI: 10.1109/ICCSP.2014.6949795
Abhishek Deb, Asutosh Kar, M. Chandra
Acoustic echo is one of the most important issues in communication. It creates disturbance in day-to-day communication. This echo can be cancelled using adaptive filters which are governed by adaptive algorithms. Right from the introduction of Least Mean Square (LMS) algorithm, over the years, a lot of research has been done in this field in order to develop new algorithms which can effectively drive the filter to give better performance. In this review paper, we have studied and discussed all the previous work done on these algorithms in relation to acoustic echo cancellation. This paper contains the basic review of all such existing algorithms as well as their merits and demerits. It covers the basic algorithms like LMS algorithm, Recursive Least Square algorithm as well as their modified versions like Normalized Least Mean Square algorithm, Fractional Least Mean Square algorithm, Filtered-x Least Mean Square algorithm etc. Finally, a tabular comparison has been given towards the end of the paper in order to conclude the discussion.
{"title":"A technical review on adaptive algorithms for acoustic echo cancellation","authors":"Abhishek Deb, Asutosh Kar, M. Chandra","doi":"10.1109/ICCSP.2014.6949795","DOIUrl":"https://doi.org/10.1109/ICCSP.2014.6949795","url":null,"abstract":"Acoustic echo is one of the most important issues in communication. It creates disturbance in day-to-day communication. This echo can be cancelled using adaptive filters which are governed by adaptive algorithms. Right from the introduction of Least Mean Square (LMS) algorithm, over the years, a lot of research has been done in this field in order to develop new algorithms which can effectively drive the filter to give better performance. In this review paper, we have studied and discussed all the previous work done on these algorithms in relation to acoustic echo cancellation. This paper contains the basic review of all such existing algorithms as well as their merits and demerits. It covers the basic algorithms like LMS algorithm, Recursive Least Square algorithm as well as their modified versions like Normalized Least Mean Square algorithm, Fractional Least Mean Square algorithm, Filtered-x Least Mean Square algorithm etc. Finally, a tabular comparison has been given towards the end of the paper in order to conclude the discussion.","PeriodicalId":149965,"journal":{"name":"2014 International Conference on Communication and Signal Processing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2014-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132671718","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-04-03DOI: 10.1109/ICCSP.2014.6950182
T. Stephen John, A. Aranganathan
Routing in mobile ad hoc network (MANETs) for groups should aim at providing reliable and robust multicast routes to the group members against link and node failures with mobility conditions. This paper propose an agent-based multicast routing scheme like On-Demand Multicast Routing Protocol (ODMRP) which can be more suitable for Ad Hoc network but D-ODMRP Destination driven On-Demand Multicast Routing Protocol is used to reduce the number of nodes to be added in the forwarding group. D-ODMRP introduces the features into the existing on demand process of multicast forwarding structure in MANET that builds a backbone in the form of a reliable mesh and finds multicast routes. Mobile autonomous agent technique for intrusion detection system in MANET has been proposed where agents are fired from a source node which traverses each node randomly and detect the malicious node. The link failure are detected and repaired by nearby nodes. This paper illustrate three types of performance analysis they are packet delivery ratio against number of multicast group, power consumption of nodes verses number of nodes & network area verses no of nodes and found that proposed system is better.
{"title":"Performance analysis of proposed mobile autonomous agent for detection of malicious node and protecting against attacks in MANET","authors":"T. Stephen John, A. Aranganathan","doi":"10.1109/ICCSP.2014.6950182","DOIUrl":"https://doi.org/10.1109/ICCSP.2014.6950182","url":null,"abstract":"Routing in mobile ad hoc network (MANETs) for groups should aim at providing reliable and robust multicast routes to the group members against link and node failures with mobility conditions. This paper propose an agent-based multicast routing scheme like On-Demand Multicast Routing Protocol (ODMRP) which can be more suitable for Ad Hoc network but D-ODMRP Destination driven On-Demand Multicast Routing Protocol is used to reduce the number of nodes to be added in the forwarding group. D-ODMRP introduces the features into the existing on demand process of multicast forwarding structure in MANET that builds a backbone in the form of a reliable mesh and finds multicast routes. Mobile autonomous agent technique for intrusion detection system in MANET has been proposed where agents are fired from a source node which traverses each node randomly and detect the malicious node. The link failure are detected and repaired by nearby nodes. This paper illustrate three types of performance analysis they are packet delivery ratio against number of multicast group, power consumption of nodes verses number of nodes & network area verses no of nodes and found that proposed system is better.","PeriodicalId":149965,"journal":{"name":"2014 International Conference on Communication and Signal Processing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2014-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133122689","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-04-03DOI: 10.1109/ICCSP.2014.6949972
Santoshkumar Sabat, Sujata V. Kadam
we have proposed an Energy efficient leader election in MANET for Intrusion detection service (IDS). As MANET don't have any centralized controller, the leader election in each cluster becomes very important. The purpose of the elected leader is to serve the IDS for the entire cluster. Our leader election is based on Reputation value and energy level of each node. We have simulated in NS2 environment and shown the comparison of energy consumption or Residual energy of nodes having fixed transmission range with the proposed adaptive energy scheme. Adaptive energy scheme adjusts the range of transmission of each node based on the maximum distance between nodes in each cluster. Energy of each node is conserved as compared to node having fixed transmission range. Thus the leader can serve the cluster for longer duration of life, increasing the percentage of alive nodes, conserving energy of node.
{"title":"Adaptive Energy aware reputation based leader election for IDS in MANET","authors":"Santoshkumar Sabat, Sujata V. Kadam","doi":"10.1109/ICCSP.2014.6949972","DOIUrl":"https://doi.org/10.1109/ICCSP.2014.6949972","url":null,"abstract":"we have proposed an Energy efficient leader election in MANET for Intrusion detection service (IDS). As MANET don't have any centralized controller, the leader election in each cluster becomes very important. The purpose of the elected leader is to serve the IDS for the entire cluster. Our leader election is based on Reputation value and energy level of each node. We have simulated in NS2 environment and shown the comparison of energy consumption or Residual energy of nodes having fixed transmission range with the proposed adaptive energy scheme. Adaptive energy scheme adjusts the range of transmission of each node based on the maximum distance between nodes in each cluster. Energy of each node is conserved as compared to node having fixed transmission range. Thus the leader can serve the cluster for longer duration of life, increasing the percentage of alive nodes, conserving energy of node.","PeriodicalId":149965,"journal":{"name":"2014 International Conference on Communication and Signal Processing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2014-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132352686","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-04-03DOI: 10.1109/ICCSP.2014.6950121
Shashidhar Virupaksha, G. Sahoo, A. Vasudevan
Organizations have a huge customer base and thus they use data mining tools to study their customers. However there is risk of sensitive information about individuals which can be gained also during this process. Hence data that is used for data mining has to be protected. There are some privacy protection algorithms which ensure privacy and protect data. These algorithms preserve privacy but data mining results significantly. In this paper we propose a clustering based noise addition that not only preserves privacy but also ensures effective data mining. Data characteristics are identified using clustering technique and noise is added within the clusters thus retaining the data characteristics.
{"title":"Privacy preservation algorithm in data mining for CRM systems","authors":"Shashidhar Virupaksha, G. Sahoo, A. Vasudevan","doi":"10.1109/ICCSP.2014.6950121","DOIUrl":"https://doi.org/10.1109/ICCSP.2014.6950121","url":null,"abstract":"Organizations have a huge customer base and thus they use data mining tools to study their customers. However there is risk of sensitive information about individuals which can be gained also during this process. Hence data that is used for data mining has to be protected. There are some privacy protection algorithms which ensure privacy and protect data. These algorithms preserve privacy but data mining results significantly. In this paper we propose a clustering based noise addition that not only preserves privacy but also ensures effective data mining. Data characteristics are identified using clustering technique and noise is added within the clusters thus retaining the data characteristics.","PeriodicalId":149965,"journal":{"name":"2014 International Conference on Communication and Signal Processing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2014-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115346478","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-04-03DOI: 10.1109/ICCSP.2014.6949833
P. Praveenkumar, K. Thenmozhi, J. Alfaaz Zami, Rengarajan Amirtharajan
Role of modern day technology in business world is very imperative and moving. Be it collaboration, telephony, social media etc. in a particular trade, ultimately, information is what being communed. Its importance is more studied and explored in the domain of Business communication. At the same time, emphasis is greatly laid to have secure communication between the parties irrespective of the medium of communication. This is where software and cryptic techniques come into help. Information security plays a crucial role in safeguarding the message or information involved in the communication. Nowadays, right from small vendors to corporate giants, every business organization relies directly or indirectly on cryptic experts for the same. This work is one such blend of technology and security for data protection. This paper deals with the comparative performance analysis of different modulation schemes like BPSK, QPSK, 8QAM, 16QAM, 32QAM and 64 QAM using concatenated Error Control Codes (ECC) in OFDM(Orthogonal Frequency Division Multiplexing). RS(Reed Solomon) codes with Convolutional codes has been used as the concatenated error control code. Then the coded data bits are encrypted to the enhance copy right protection. BER Vs Eb/No graphs are plotted using various modulation schemes adopting AWGN (Additive White Gaussian Noise channel), Rayleigh and Rician Fading Channels. Correlation values are computed for various inner and outer code rates to validate the encryption operation.
现代技术在商业世界中的作用是非常必要和移动的。无论是合作、电话、社交媒体等,在一个特定的行业,最终,信息是被交流的东西。它的重要性在商务交流领域得到了更多的研究和探索。与此同时,无论通信媒介如何,都非常强调各方之间的安全通信。这就是软件和神秘技术发挥作用的地方。信息安全在保护通信中涉及的消息或信息方面起着至关重要的作用。如今,从小型供应商到企业巨头,每个商业组织都直接或间接地依赖于加密专家。这项工作是数据保护技术和安全的结合。本文对正交频分复用技术中BPSK、QPSK、8QAM、16QAM、32QAM和64qam调制方案的性能进行了比较分析。RS(Reed Solomon)码与卷积码被用作串联错误控制码。然后对编码后的数据位进行加密,加强版权保护。利用AWGN(加性高斯白噪声信道)、瑞利和瑞利衰落信道等调制方案绘制了BER Vs Eb/No图。计算各种内部和外部码率的相关值,以验证加密操作。
{"title":"Blend of error control codes in OFDM - effect of channel - a comparative approach","authors":"P. Praveenkumar, K. Thenmozhi, J. Alfaaz Zami, Rengarajan Amirtharajan","doi":"10.1109/ICCSP.2014.6949833","DOIUrl":"https://doi.org/10.1109/ICCSP.2014.6949833","url":null,"abstract":"Role of modern day technology in business world is very imperative and moving. Be it collaboration, telephony, social media etc. in a particular trade, ultimately, information is what being communed. Its importance is more studied and explored in the domain of Business communication. At the same time, emphasis is greatly laid to have secure communication between the parties irrespective of the medium of communication. This is where software and cryptic techniques come into help. Information security plays a crucial role in safeguarding the message or information involved in the communication. Nowadays, right from small vendors to corporate giants, every business organization relies directly or indirectly on cryptic experts for the same. This work is one such blend of technology and security for data protection. This paper deals with the comparative performance analysis of different modulation schemes like BPSK, QPSK, 8QAM, 16QAM, 32QAM and 64 QAM using concatenated Error Control Codes (ECC) in OFDM(Orthogonal Frequency Division Multiplexing). RS(Reed Solomon) codes with Convolutional codes has been used as the concatenated error control code. Then the coded data bits are encrypted to the enhance copy right protection. BER Vs Eb/No graphs are plotted using various modulation schemes adopting AWGN (Additive White Gaussian Noise channel), Rayleigh and Rician Fading Channels. Correlation values are computed for various inner and outer code rates to validate the encryption operation.","PeriodicalId":149965,"journal":{"name":"2014 International Conference on Communication and Signal Processing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2014-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115602710","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-04-03DOI: 10.1109/ICCSP.2014.6950123
K. Suriya, G. Durga
This paper presents the design of V-band low power down-conversion mixer operating in weak inversion biasing region using 90-nm CMOS technology. The mixer exhibits a double-balanced Gilbert cell structure in source-driven topology with RF signal applied at the gate and local oscillator (LO) signal at the source. It achieves high conversion gain of 7.297 dB at RF signal of 60 GHz at standard supply voltage of 1.2 V. Other performance parameters measured are LO-to-RF port isolation as more than 40 dB, the third-order input intercept point (IIP3) as -1.692 dBm, OP1dB as -7.382 dBm and DC power consumption of 548 μW at LO power of -6 dBm indicates that this mixer is suitable for low power millimeter-wave (MMW) radio applications. The mixer is designed and simulated using Agilent's Advanced Design System (ADS).
{"title":"Design of 50–75 GHz V-band low power and high gain down-conversion mixer","authors":"K. Suriya, G. Durga","doi":"10.1109/ICCSP.2014.6950123","DOIUrl":"https://doi.org/10.1109/ICCSP.2014.6950123","url":null,"abstract":"This paper presents the design of V-band low power down-conversion mixer operating in weak inversion biasing region using 90-nm CMOS technology. The mixer exhibits a double-balanced Gilbert cell structure in source-driven topology with RF signal applied at the gate and local oscillator (LO) signal at the source. It achieves high conversion gain of 7.297 dB at RF signal of 60 GHz at standard supply voltage of 1.2 V. Other performance parameters measured are LO-to-RF port isolation as more than 40 dB, the third-order input intercept point (IIP3) as -1.692 dBm, OP1dB as -7.382 dBm and DC power consumption of 548 μW at LO power of -6 dBm indicates that this mixer is suitable for low power millimeter-wave (MMW) radio applications. The mixer is designed and simulated using Agilent's Advanced Design System (ADS).","PeriodicalId":149965,"journal":{"name":"2014 International Conference on Communication and Signal Processing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2014-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115738055","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-04-03DOI: 10.1109/ICCSP.2014.6950038
Rajamanickam Murugesan, M. Saravanan, Mariappan Vijyaraj
The exodus to Wireless networks from wired network is a growing field in the past few decades. Various wireless applications are made up of mobility and scalability based nodes. Among all the wireless networks Mobile Ad-Hoc network is one of the most significant and distinctive applications today. All the nodes are self employed, not fixed on a fixed network infrastructure, and it can act as sender as well as receiver, and directly communicate to the other nodes in the network within the communication range of the network. Also the nodes in the Wireless network can act as relay nodes to their neighbors to relay messages. Since the nodes in the Wireless Network having the ability to self-configuring by them, they are deployed in critical mission based applications like military usage or any kind of emergency recovery. Since the open medium and wide distribution of nodes make the network vulnerable to malicious attackers. In such situations, it is necessary to deploy an effective IDS mechanism to prevent or protect the Network from attacks. In the existing system EAACK - [Enhanced Adaptive Acknowledgement] is proposed as an IDS and it especially designed for MANET. In this paper a combined IP-trace back with E2AACK - [End-to-End Adaptive Acknowledgment] mechanism is proposed to detect and prevent the malicious nodes in the network. The malicious node activity can be detected by IP-trace back and prevented by getting acknowledgement from both end nodes. The simulation result shows that the E2AACK approach provides higher detection rate and prevention which greatly affect the network performance in terms of throughput and delay.
{"title":"A node authentication clustering based security for ADHOC network","authors":"Rajamanickam Murugesan, M. Saravanan, Mariappan Vijyaraj","doi":"10.1109/ICCSP.2014.6950038","DOIUrl":"https://doi.org/10.1109/ICCSP.2014.6950038","url":null,"abstract":"The exodus to Wireless networks from wired network is a growing field in the past few decades. Various wireless applications are made up of mobility and scalability based nodes. Among all the wireless networks Mobile Ad-Hoc network is one of the most significant and distinctive applications today. All the nodes are self employed, not fixed on a fixed network infrastructure, and it can act as sender as well as receiver, and directly communicate to the other nodes in the network within the communication range of the network. Also the nodes in the Wireless network can act as relay nodes to their neighbors to relay messages. Since the nodes in the Wireless Network having the ability to self-configuring by them, they are deployed in critical mission based applications like military usage or any kind of emergency recovery. Since the open medium and wide distribution of nodes make the network vulnerable to malicious attackers. In such situations, it is necessary to deploy an effective IDS mechanism to prevent or protect the Network from attacks. In the existing system EAACK - [Enhanced Adaptive Acknowledgement] is proposed as an IDS and it especially designed for MANET. In this paper a combined IP-trace back with E2AACK - [End-to-End Adaptive Acknowledgment] mechanism is proposed to detect and prevent the malicious nodes in the network. The malicious node activity can be detected by IP-trace back and prevented by getting acknowledgement from both end nodes. The simulation result shows that the E2AACK approach provides higher detection rate and prevention which greatly affect the network performance in terms of throughput and delay.","PeriodicalId":149965,"journal":{"name":"2014 International Conference on Communication and Signal Processing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2014-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116283816","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-04-03DOI: 10.1109/ICCSP.2014.6949814
A. Devi, S. Prince
Visible light communication is a data communication medium, uses the light spectrum between 390nm-700nm. LEDs are used for data transmission along with illumination purpose in visible light communication (VLC). LEDs can easily switch ON and OFF with logical `1' & `0' and data can be sent serially. There are many areas where we can implement VLC but one of the promising stretches that could possibly revolutionize the telecommunication industry is deployment of optical wireless in GSM system. Because of the restriction of Radio Frequency (RF) in some places like hospitals, airplane, petrol stations etc. VLC can be used as an alternative solution for those. The main aim of this project is to design and analyses the optical wireless system to provide connectivity to users in low restricted RF region. A prototype model of the Radio on visible light (RoVL) is proposed to be developed and tested.
{"title":"Design and implementation of a Radio on visible light system for indoor communication","authors":"A. Devi, S. Prince","doi":"10.1109/ICCSP.2014.6949814","DOIUrl":"https://doi.org/10.1109/ICCSP.2014.6949814","url":null,"abstract":"Visible light communication is a data communication medium, uses the light spectrum between 390nm-700nm. LEDs are used for data transmission along with illumination purpose in visible light communication (VLC). LEDs can easily switch ON and OFF with logical `1' & `0' and data can be sent serially. There are many areas where we can implement VLC but one of the promising stretches that could possibly revolutionize the telecommunication industry is deployment of optical wireless in GSM system. Because of the restriction of Radio Frequency (RF) in some places like hospitals, airplane, petrol stations etc. VLC can be used as an alternative solution for those. The main aim of this project is to design and analyses the optical wireless system to provide connectivity to users in low restricted RF region. A prototype model of the Radio on visible light (RoVL) is proposed to be developed and tested.","PeriodicalId":149965,"journal":{"name":"2014 International Conference on Communication and Signal Processing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2014-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115112746","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-04-03DOI: 10.1109/ICCSP.2014.6950075
Teja Mvsr, Ajith Kumar, C. V. Sai Prasanth
Heavy amount of research is being done to reduce side lobes in antennas radiation pattern. Many novel techniques have been adopted in this pursuit. One such technique playing pivotal role in reducing side lobes is windowing techniques. The main emphasis of this paper lies on evaluation and comparison of different windowing techniques efficiency in reducing side lobes of an end-fire array. The windowing techniques chosen for comparison are Bartlett window, Hamming window, Hanning window, Blackman Harris window. The number of elements in array are eight and sixteen respectively. Finally we compared the performance of every window in terms of side lobes level (SLL) and generated polar plots and radiation patterns for each window. Hence we found out that performance of Blackman Harris window is very good and it is a very good general purpose window, having good side lobe rejection and having a moderately wide main lobe.
{"title":"Comparative analysis of windowing techniques in minimizing side lobes in an antenna array","authors":"Teja Mvsr, Ajith Kumar, C. V. Sai Prasanth","doi":"10.1109/ICCSP.2014.6950075","DOIUrl":"https://doi.org/10.1109/ICCSP.2014.6950075","url":null,"abstract":"Heavy amount of research is being done to reduce side lobes in antennas radiation pattern. Many novel techniques have been adopted in this pursuit. One such technique playing pivotal role in reducing side lobes is windowing techniques. The main emphasis of this paper lies on evaluation and comparison of different windowing techniques efficiency in reducing side lobes of an end-fire array. The windowing techniques chosen for comparison are Bartlett window, Hamming window, Hanning window, Blackman Harris window. The number of elements in array are eight and sixteen respectively. Finally we compared the performance of every window in terms of side lobes level (SLL) and generated polar plots and radiation patterns for each window. Hence we found out that performance of Blackman Harris window is very good and it is a very good general purpose window, having good side lobe rejection and having a moderately wide main lobe.","PeriodicalId":149965,"journal":{"name":"2014 International Conference on Communication and Signal Processing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2014-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123131133","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}