Pub Date : 2014-04-03DOI: 10.1109/ICCSP.2014.6950064
A. Dey, S. Palit, D. K. Bhattacharya, D. N. Tibarewala, Dipan Sarkar
Study of the effect of music on autonomic nervous system of human being through the analysis of Heart rate variability (HRV) signals is a very recent area of research. The present paper considers the effect of seven different types of music stimuli on a single subject. The data of the HRV signals are subjected to a recently developed technique known as `frequency-delay plot'. The quantification is done by `ellipsoid fit' and allied five different types of quantification measures. Such results of quantification are then analyzed by the method of 'randomized block ANOVA. It is proved that all the different types of music stimuli have different effects on ANS of the subject, and that the effects are significantly different. Moreover the five different measures also do differ significantly on the music data. Finally to test which music signal affects ANS most, we consider, as population, the totality of all data corresponding to different types of songs and different types of measures taken. By considering the data of individual song under all measures as data of a sample, we calculate the interval of confidence of the population mean and the population variance with the help of each sample mean and sample variance at 0.95 level of confidence. It is proved that the length of confidence interval for population mean as well as for population variance is minimum only in the case of song1. In other words, it means that song1 is the most effective one on ANS of the subject.
{"title":"Study of the effect of different music stimuli on autonomic nervous system of a single subject","authors":"A. Dey, S. Palit, D. K. Bhattacharya, D. N. Tibarewala, Dipan Sarkar","doi":"10.1109/ICCSP.2014.6950064","DOIUrl":"https://doi.org/10.1109/ICCSP.2014.6950064","url":null,"abstract":"Study of the effect of music on autonomic nervous system of human being through the analysis of Heart rate variability (HRV) signals is a very recent area of research. The present paper considers the effect of seven different types of music stimuli on a single subject. The data of the HRV signals are subjected to a recently developed technique known as `frequency-delay plot'. The quantification is done by `ellipsoid fit' and allied five different types of quantification measures. Such results of quantification are then analyzed by the method of 'randomized block ANOVA. It is proved that all the different types of music stimuli have different effects on ANS of the subject, and that the effects are significantly different. Moreover the five different measures also do differ significantly on the music data. Finally to test which music signal affects ANS most, we consider, as population, the totality of all data corresponding to different types of songs and different types of measures taken. By considering the data of individual song under all measures as data of a sample, we calculate the interval of confidence of the population mean and the population variance with the help of each sample mean and sample variance at 0.95 level of confidence. It is proved that the length of confidence interval for population mean as well as for population variance is minimum only in the case of song1. In other words, it means that song1 is the most effective one on ANS of the subject.","PeriodicalId":149965,"journal":{"name":"2014 International Conference on Communication and Signal Processing","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121840107","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-04-03DOI: 10.1109/ICCSP.2014.6949928
Nilesh S. Shirude, R. Pinto, M. Panse
RADAR (Radio Wave Detection And Ranging) systems are widely used now days for detecting a target, obtaining its location along with direction and velocity of detected object. Most challenging part in RADAR system is to getting better accuracy and resolution. In this paper, we have designed a radar transmitter and receiver using direct sequence spread spectrum for improving range accuracy. Spread spectrum modulation technique has been chosen as it has some inherent merits like accuracy of ranging, sensitivity of power estimation, interference suppression etc.
{"title":"Range estimation using direct sequence spread spectrum","authors":"Nilesh S. Shirude, R. Pinto, M. Panse","doi":"10.1109/ICCSP.2014.6949928","DOIUrl":"https://doi.org/10.1109/ICCSP.2014.6949928","url":null,"abstract":"RADAR (Radio Wave Detection And Ranging) systems are widely used now days for detecting a target, obtaining its location along with direction and velocity of detected object. Most challenging part in RADAR system is to getting better accuracy and resolution. In this paper, we have designed a radar transmitter and receiver using direct sequence spread spectrum for improving range accuracy. Spread spectrum modulation technique has been chosen as it has some inherent merits like accuracy of ranging, sensitivity of power estimation, interference suppression etc.","PeriodicalId":149965,"journal":{"name":"2014 International Conference on Communication and Signal Processing","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131584021","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-04-03DOI: 10.1109/ICCSP.2014.6950157
P. Ramasubramanian, R. Emiliya, R. Janaki, B. Daniel, C. Anand
Number Plate Recognition (NPR) and Character Segmentation (CS) play a major role in one of the intelligent transportation system. This paper identifies a number plate identification system for Indian plates. This method consists of two main modules: NPR and CS. In NPR, histogram equalization is employed to solve the low contrast and dynamic-range problems and Eight-Neighbors technique is proposed to filter the unwanted areas in the image. In CS, the hybrid binarization technique is proposed to effectively segment the characters in the dirt NP. The system captures the images of the vehicles at various backgrounds and conditions using a digital camera. The results are highly appreciable.
{"title":"Number plate Recognition and Character Segmentation using Eight-Neighbors and hybrid binarization techniques","authors":"P. Ramasubramanian, R. Emiliya, R. Janaki, B. Daniel, C. Anand","doi":"10.1109/ICCSP.2014.6950157","DOIUrl":"https://doi.org/10.1109/ICCSP.2014.6950157","url":null,"abstract":"Number Plate Recognition (NPR) and Character Segmentation (CS) play a major role in one of the intelligent transportation system. This paper identifies a number plate identification system for Indian plates. This method consists of two main modules: NPR and CS. In NPR, histogram equalization is employed to solve the low contrast and dynamic-range problems and Eight-Neighbors technique is proposed to filter the unwanted areas in the image. In CS, the hybrid binarization technique is proposed to effectively segment the characters in the dirt NP. The system captures the images of the vehicles at various backgrounds and conditions using a digital camera. The results are highly appreciable.","PeriodicalId":149965,"journal":{"name":"2014 International Conference on Communication and Signal Processing","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115143098","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-04-03DOI: 10.1109/ICCSP.2014.6950009
Jayant Mankar, P. Malviya
To analyze lung sound by auscultation method requires substantial clinical experience, a fine stethoscope and good listening skills. The lung itself cannot generate sound if there is no airflow; pressure differences between structures within the thorax. The type of lung sound can be known by listening to the lung sound. The timing, repeatability and shape of crackles are important parameter for diagnosis. In this paper, we aim to detect and classify crackle to find deformities in lungs.
{"title":"Analysis of lung diseases and detecting deformities in human lung by classifying lung sounds","authors":"Jayant Mankar, P. Malviya","doi":"10.1109/ICCSP.2014.6950009","DOIUrl":"https://doi.org/10.1109/ICCSP.2014.6950009","url":null,"abstract":"To analyze lung sound by auscultation method requires substantial clinical experience, a fine stethoscope and good listening skills. The lung itself cannot generate sound if there is no airflow; pressure differences between structures within the thorax. The type of lung sound can be known by listening to the lung sound. The timing, repeatability and shape of crackles are important parameter for diagnosis. In this paper, we aim to detect and classify crackle to find deformities in lungs.","PeriodicalId":149965,"journal":{"name":"2014 International Conference on Communication and Signal Processing","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127721011","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-04-03DOI: 10.1109/ICCSP.2014.6949795
Abhishek Deb, Asutosh Kar, M. Chandra
Acoustic echo is one of the most important issues in communication. It creates disturbance in day-to-day communication. This echo can be cancelled using adaptive filters which are governed by adaptive algorithms. Right from the introduction of Least Mean Square (LMS) algorithm, over the years, a lot of research has been done in this field in order to develop new algorithms which can effectively drive the filter to give better performance. In this review paper, we have studied and discussed all the previous work done on these algorithms in relation to acoustic echo cancellation. This paper contains the basic review of all such existing algorithms as well as their merits and demerits. It covers the basic algorithms like LMS algorithm, Recursive Least Square algorithm as well as their modified versions like Normalized Least Mean Square algorithm, Fractional Least Mean Square algorithm, Filtered-x Least Mean Square algorithm etc. Finally, a tabular comparison has been given towards the end of the paper in order to conclude the discussion.
{"title":"A technical review on adaptive algorithms for acoustic echo cancellation","authors":"Abhishek Deb, Asutosh Kar, M. Chandra","doi":"10.1109/ICCSP.2014.6949795","DOIUrl":"https://doi.org/10.1109/ICCSP.2014.6949795","url":null,"abstract":"Acoustic echo is one of the most important issues in communication. It creates disturbance in day-to-day communication. This echo can be cancelled using adaptive filters which are governed by adaptive algorithms. Right from the introduction of Least Mean Square (LMS) algorithm, over the years, a lot of research has been done in this field in order to develop new algorithms which can effectively drive the filter to give better performance. In this review paper, we have studied and discussed all the previous work done on these algorithms in relation to acoustic echo cancellation. This paper contains the basic review of all such existing algorithms as well as their merits and demerits. It covers the basic algorithms like LMS algorithm, Recursive Least Square algorithm as well as their modified versions like Normalized Least Mean Square algorithm, Fractional Least Mean Square algorithm, Filtered-x Least Mean Square algorithm etc. Finally, a tabular comparison has been given towards the end of the paper in order to conclude the discussion.","PeriodicalId":149965,"journal":{"name":"2014 International Conference on Communication and Signal Processing","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132671718","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-04-03DOI: 10.1109/ICCSP.2014.6950182
T. Stephen John, A. Aranganathan
Routing in mobile ad hoc network (MANETs) for groups should aim at providing reliable and robust multicast routes to the group members against link and node failures with mobility conditions. This paper propose an agent-based multicast routing scheme like On-Demand Multicast Routing Protocol (ODMRP) which can be more suitable for Ad Hoc network but D-ODMRP Destination driven On-Demand Multicast Routing Protocol is used to reduce the number of nodes to be added in the forwarding group. D-ODMRP introduces the features into the existing on demand process of multicast forwarding structure in MANET that builds a backbone in the form of a reliable mesh and finds multicast routes. Mobile autonomous agent technique for intrusion detection system in MANET has been proposed where agents are fired from a source node which traverses each node randomly and detect the malicious node. The link failure are detected and repaired by nearby nodes. This paper illustrate three types of performance analysis they are packet delivery ratio against number of multicast group, power consumption of nodes verses number of nodes & network area verses no of nodes and found that proposed system is better.
{"title":"Performance analysis of proposed mobile autonomous agent for detection of malicious node and protecting against attacks in MANET","authors":"T. Stephen John, A. Aranganathan","doi":"10.1109/ICCSP.2014.6950182","DOIUrl":"https://doi.org/10.1109/ICCSP.2014.6950182","url":null,"abstract":"Routing in mobile ad hoc network (MANETs) for groups should aim at providing reliable and robust multicast routes to the group members against link and node failures with mobility conditions. This paper propose an agent-based multicast routing scheme like On-Demand Multicast Routing Protocol (ODMRP) which can be more suitable for Ad Hoc network but D-ODMRP Destination driven On-Demand Multicast Routing Protocol is used to reduce the number of nodes to be added in the forwarding group. D-ODMRP introduces the features into the existing on demand process of multicast forwarding structure in MANET that builds a backbone in the form of a reliable mesh and finds multicast routes. Mobile autonomous agent technique for intrusion detection system in MANET has been proposed where agents are fired from a source node which traverses each node randomly and detect the malicious node. The link failure are detected and repaired by nearby nodes. This paper illustrate three types of performance analysis they are packet delivery ratio against number of multicast group, power consumption of nodes verses number of nodes & network area verses no of nodes and found that proposed system is better.","PeriodicalId":149965,"journal":{"name":"2014 International Conference on Communication and Signal Processing","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133122689","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-04-03DOI: 10.1109/ICCSP.2014.6949972
Santoshkumar Sabat, Sujata V. Kadam
we have proposed an Energy efficient leader election in MANET for Intrusion detection service (IDS). As MANET don't have any centralized controller, the leader election in each cluster becomes very important. The purpose of the elected leader is to serve the IDS for the entire cluster. Our leader election is based on Reputation value and energy level of each node. We have simulated in NS2 environment and shown the comparison of energy consumption or Residual energy of nodes having fixed transmission range with the proposed adaptive energy scheme. Adaptive energy scheme adjusts the range of transmission of each node based on the maximum distance between nodes in each cluster. Energy of each node is conserved as compared to node having fixed transmission range. Thus the leader can serve the cluster for longer duration of life, increasing the percentage of alive nodes, conserving energy of node.
{"title":"Adaptive Energy aware reputation based leader election for IDS in MANET","authors":"Santoshkumar Sabat, Sujata V. Kadam","doi":"10.1109/ICCSP.2014.6949972","DOIUrl":"https://doi.org/10.1109/ICCSP.2014.6949972","url":null,"abstract":"we have proposed an Energy efficient leader election in MANET for Intrusion detection service (IDS). As MANET don't have any centralized controller, the leader election in each cluster becomes very important. The purpose of the elected leader is to serve the IDS for the entire cluster. Our leader election is based on Reputation value and energy level of each node. We have simulated in NS2 environment and shown the comparison of energy consumption or Residual energy of nodes having fixed transmission range with the proposed adaptive energy scheme. Adaptive energy scheme adjusts the range of transmission of each node based on the maximum distance between nodes in each cluster. Energy of each node is conserved as compared to node having fixed transmission range. Thus the leader can serve the cluster for longer duration of life, increasing the percentage of alive nodes, conserving energy of node.","PeriodicalId":149965,"journal":{"name":"2014 International Conference on Communication and Signal Processing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132352686","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-04-03DOI: 10.1109/ICCSP.2014.6950038
Rajamanickam Murugesan, M. Saravanan, Mariappan Vijyaraj
The exodus to Wireless networks from wired network is a growing field in the past few decades. Various wireless applications are made up of mobility and scalability based nodes. Among all the wireless networks Mobile Ad-Hoc network is one of the most significant and distinctive applications today. All the nodes are self employed, not fixed on a fixed network infrastructure, and it can act as sender as well as receiver, and directly communicate to the other nodes in the network within the communication range of the network. Also the nodes in the Wireless network can act as relay nodes to their neighbors to relay messages. Since the nodes in the Wireless Network having the ability to self-configuring by them, they are deployed in critical mission based applications like military usage or any kind of emergency recovery. Since the open medium and wide distribution of nodes make the network vulnerable to malicious attackers. In such situations, it is necessary to deploy an effective IDS mechanism to prevent or protect the Network from attacks. In the existing system EAACK - [Enhanced Adaptive Acknowledgement] is proposed as an IDS and it especially designed for MANET. In this paper a combined IP-trace back with E2AACK - [End-to-End Adaptive Acknowledgment] mechanism is proposed to detect and prevent the malicious nodes in the network. The malicious node activity can be detected by IP-trace back and prevented by getting acknowledgement from both end nodes. The simulation result shows that the E2AACK approach provides higher detection rate and prevention which greatly affect the network performance in terms of throughput and delay.
{"title":"A node authentication clustering based security for ADHOC network","authors":"Rajamanickam Murugesan, M. Saravanan, Mariappan Vijyaraj","doi":"10.1109/ICCSP.2014.6950038","DOIUrl":"https://doi.org/10.1109/ICCSP.2014.6950038","url":null,"abstract":"The exodus to Wireless networks from wired network is a growing field in the past few decades. Various wireless applications are made up of mobility and scalability based nodes. Among all the wireless networks Mobile Ad-Hoc network is one of the most significant and distinctive applications today. All the nodes are self employed, not fixed on a fixed network infrastructure, and it can act as sender as well as receiver, and directly communicate to the other nodes in the network within the communication range of the network. Also the nodes in the Wireless network can act as relay nodes to their neighbors to relay messages. Since the nodes in the Wireless Network having the ability to self-configuring by them, they are deployed in critical mission based applications like military usage or any kind of emergency recovery. Since the open medium and wide distribution of nodes make the network vulnerable to malicious attackers. In such situations, it is necessary to deploy an effective IDS mechanism to prevent or protect the Network from attacks. In the existing system EAACK - [Enhanced Adaptive Acknowledgement] is proposed as an IDS and it especially designed for MANET. In this paper a combined IP-trace back with E2AACK - [End-to-End Adaptive Acknowledgment] mechanism is proposed to detect and prevent the malicious nodes in the network. The malicious node activity can be detected by IP-trace back and prevented by getting acknowledgement from both end nodes. The simulation result shows that the E2AACK approach provides higher detection rate and prevention which greatly affect the network performance in terms of throughput and delay.","PeriodicalId":149965,"journal":{"name":"2014 International Conference on Communication and Signal Processing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116283816","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-04-03DOI: 10.1109/ICCSP.2014.6949814
A. Devi, S. Prince
Visible light communication is a data communication medium, uses the light spectrum between 390nm-700nm. LEDs are used for data transmission along with illumination purpose in visible light communication (VLC). LEDs can easily switch ON and OFF with logical `1' & `0' and data can be sent serially. There are many areas where we can implement VLC but one of the promising stretches that could possibly revolutionize the telecommunication industry is deployment of optical wireless in GSM system. Because of the restriction of Radio Frequency (RF) in some places like hospitals, airplane, petrol stations etc. VLC can be used as an alternative solution for those. The main aim of this project is to design and analyses the optical wireless system to provide connectivity to users in low restricted RF region. A prototype model of the Radio on visible light (RoVL) is proposed to be developed and tested.
{"title":"Design and implementation of a Radio on visible light system for indoor communication","authors":"A. Devi, S. Prince","doi":"10.1109/ICCSP.2014.6949814","DOIUrl":"https://doi.org/10.1109/ICCSP.2014.6949814","url":null,"abstract":"Visible light communication is a data communication medium, uses the light spectrum between 390nm-700nm. LEDs are used for data transmission along with illumination purpose in visible light communication (VLC). LEDs can easily switch ON and OFF with logical `1' & `0' and data can be sent serially. There are many areas where we can implement VLC but one of the promising stretches that could possibly revolutionize the telecommunication industry is deployment of optical wireless in GSM system. Because of the restriction of Radio Frequency (RF) in some places like hospitals, airplane, petrol stations etc. VLC can be used as an alternative solution for those. The main aim of this project is to design and analyses the optical wireless system to provide connectivity to users in low restricted RF region. A prototype model of the Radio on visible light (RoVL) is proposed to be developed and tested.","PeriodicalId":149965,"journal":{"name":"2014 International Conference on Communication and Signal Processing","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115112746","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-04-03DOI: 10.1109/ICCSP.2014.6950075
Teja Mvsr, Ajith Kumar, C. V. Sai Prasanth
Heavy amount of research is being done to reduce side lobes in antennas radiation pattern. Many novel techniques have been adopted in this pursuit. One such technique playing pivotal role in reducing side lobes is windowing techniques. The main emphasis of this paper lies on evaluation and comparison of different windowing techniques efficiency in reducing side lobes of an end-fire array. The windowing techniques chosen for comparison are Bartlett window, Hamming window, Hanning window, Blackman Harris window. The number of elements in array are eight and sixteen respectively. Finally we compared the performance of every window in terms of side lobes level (SLL) and generated polar plots and radiation patterns for each window. Hence we found out that performance of Blackman Harris window is very good and it is a very good general purpose window, having good side lobe rejection and having a moderately wide main lobe.
{"title":"Comparative analysis of windowing techniques in minimizing side lobes in an antenna array","authors":"Teja Mvsr, Ajith Kumar, C. V. Sai Prasanth","doi":"10.1109/ICCSP.2014.6950075","DOIUrl":"https://doi.org/10.1109/ICCSP.2014.6950075","url":null,"abstract":"Heavy amount of research is being done to reduce side lobes in antennas radiation pattern. Many novel techniques have been adopted in this pursuit. One such technique playing pivotal role in reducing side lobes is windowing techniques. The main emphasis of this paper lies on evaluation and comparison of different windowing techniques efficiency in reducing side lobes of an end-fire array. The windowing techniques chosen for comparison are Bartlett window, Hamming window, Hanning window, Blackman Harris window. The number of elements in array are eight and sixteen respectively. Finally we compared the performance of every window in terms of side lobes level (SLL) and generated polar plots and radiation patterns for each window. Hence we found out that performance of Blackman Harris window is very good and it is a very good general purpose window, having good side lobe rejection and having a moderately wide main lobe.","PeriodicalId":149965,"journal":{"name":"2014 International Conference on Communication and Signal Processing","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123131133","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}