Pub Date : 2023-05-23DOI: 10.46610/jooce.2023.v09i02.001
Sakshi. S. Sawant, Aparna. S. Shirkande, N. Shinde, Sharanya Rao
Devanagari script is widely used across India. It forms many languages like Hindi, Marathi, Nepali and Sanskrit languages. As the Devanagari characters are similar to the hindi character the national language of India. It is important to recognize the characters to understand the message that particular tries to tell. The automatic character recognition system is thus developing for the Devanagari script. The character recognition process converts an image of a character into machine-readable format also its English corresponds. In this paper, we are using Convolutional Neural Network for developing the character recognition system. Convolutional neural network learns directly from data. It is a type of Deep learning neural network architecture. CNN is useful as it does not require any human intervention and performs the identification of important features on its own. The proposed paper uses a CNN algorithm applied to a dataset of 49 characters of Devanagari script. The dataset contains of total 4018 Images. The algorithm of the Convolutional Neural Network is applied to train the dataset. The input image to be predicted is first preprocessed and then the model predicts the output result. The system is designed in Jupyter Lab using Python. The Convolutional Neural Network model's overall accuracy is 98%.
{"title":"OCR Of Devanagari Script Using CNN","authors":"Sakshi. S. Sawant, Aparna. S. Shirkande, N. Shinde, Sharanya Rao","doi":"10.46610/jooce.2023.v09i02.001","DOIUrl":"https://doi.org/10.46610/jooce.2023.v09i02.001","url":null,"abstract":"Devanagari script is widely used across India. It forms many languages like Hindi, Marathi, Nepali and Sanskrit languages. As the Devanagari characters are similar to the hindi character the national language of India. It is important to recognize the characters to understand the message that particular tries to tell. The automatic character recognition system is thus developing for the Devanagari script. The character recognition process converts an image of a character into machine-readable format also its English corresponds. In this paper, we are using Convolutional Neural Network for developing the character recognition system. Convolutional neural network learns directly from data. It is a type of Deep learning neural network architecture. CNN is useful as it does not require any human intervention and performs the identification of important features on its own. The proposed paper uses a CNN algorithm applied to a dataset of 49 characters of Devanagari script. The dataset contains of total 4018 Images. The algorithm of the Convolutional Neural Network is applied to train the dataset. The input image to be predicted is first preprocessed and then the model predicts the output result. The system is designed in Jupyter Lab using Python. The Convolutional Neural Network model's overall accuracy is 98%.","PeriodicalId":159105,"journal":{"name":"Journal of Optical Communication Electronics","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133828719","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The creation of a remote-controlled fire robot is the primary objective of this project. The water tank and wireless pump on this robot both spray water. A Peripheral Interface Controller (PIC) microcontroller performs the functionality offered. The transmitter button sends instructions to the receiver, telling it to move the robot in front, back, left, and right. To run the DC motor through the motor controller Integrated Circuit (IC) for the necessary duty, the decoder decodes the data before sending it to another microcontroller. The remote control has a decent range of up to 100 metres with the right antenna. The water tank and water pump linked to the robot body are operated by the microcontroller's output in conjunction with the appropriate signal from the transmitter. An Arduino Uno series microprocessor controls the entire operation.
{"title":"Implementation of Solar Powered Autonomous Fire Fighting Robot","authors":"Priti Bhange, Dolly Gulhane, Payal Chavhan, Pradnya Ramteke, Yamini Ishwarkar, Chirag Katre, Dipak Bawankule","doi":"10.46610/jooce.2023.v09i01.005","DOIUrl":"https://doi.org/10.46610/jooce.2023.v09i01.005","url":null,"abstract":"The creation of a remote-controlled fire robot is the primary objective of this project. The water tank and wireless pump on this robot both spray water. A Peripheral Interface Controller (PIC) microcontroller performs the functionality offered. The transmitter button sends instructions to the receiver, telling it to move the robot in front, back, left, and right. To run the DC motor through the motor controller Integrated Circuit (IC) for the necessary duty, the decoder decodes the data before sending it to another microcontroller. The remote control has a decent range of up to 100 metres with the right antenna. The water tank and water pump linked to the robot body are operated by the microcontroller's output in conjunction with the appropriate signal from the transmitter. An Arduino Uno series microprocessor controls the entire operation.","PeriodicalId":159105,"journal":{"name":"Journal of Optical Communication Electronics","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127812979","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-05-03DOI: 10.46610/jooce.2023.v09i01.003
S. Ashtekar, Sagar Tekam, Jayant Sahare, Ritikesh Gokhe, Seemaran Raikwar, Rakesh W. Ramteke
In this study, we used GSM and fingerprint technology to investigate the door locking and unlocking system. To keep your information, money, space and personal property from intruders. This paper provides fingerprint and GSM base door lock systems for SMS-based door lock control. ARDUINO microcontroller, GSM module, fingerprint module, keypad, display LCD, servo motor and buzzer are the components of this security system. The entire driver unit is under the control of an Arduino microcontroller. It serves as a means of communication. The GSM method for mobile alarm messages in case of failed password attempts. The password required for authentication is entered using a keypad module. If the password is entered incorrectly, an error message appears on the screen LCD. A message is sent to the registered user via the GSM module, and if there are people or security personnel nearby, the associated buzzer sounds to alert them.
{"title":"Fingerprint and GSM Based Door Lock System","authors":"S. Ashtekar, Sagar Tekam, Jayant Sahare, Ritikesh Gokhe, Seemaran Raikwar, Rakesh W. Ramteke","doi":"10.46610/jooce.2023.v09i01.003","DOIUrl":"https://doi.org/10.46610/jooce.2023.v09i01.003","url":null,"abstract":"In this study, we used GSM and fingerprint technology to investigate the door locking and unlocking system. To keep your information, money, space and personal property from intruders. This paper provides fingerprint and GSM base door lock systems for SMS-based door lock control. ARDUINO microcontroller, GSM module, fingerprint module, keypad, display LCD, servo motor and buzzer are the components of this security system. The entire driver unit is under the control of an Arduino microcontroller. It serves as a means of communication. The GSM method for mobile alarm messages in case of failed password attempts. The password required for authentication is entered using a keypad module. If the password is entered incorrectly, an error message appears on the screen LCD. A message is sent to the registered user via the GSM module, and if there are people or security personnel nearby, the associated buzzer sounds to alert them.","PeriodicalId":159105,"journal":{"name":"Journal of Optical Communication Electronics","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134641370","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-08-31DOI: 10.46610/jooce.2022.v08i02.005
Sumedh Rawat
According to the relevance of the existing information's role in various companies, competent management is required to ensure the security of that information. The information security refers to protecting information and minimizing unauthorized access to it. Management system of the information security means the information security of a part of general and overall information security in an organization that is based on business risks’ approach and aims to establish, implement, operate, monitor, verify, maintain and improve information security. In this study, we have tried to introduce information security management system, types of threatening risks of information systems and also introduce and offer proper ways to maintain information security of each organization and then work on necessary requirements in order to design information security system and phases of implementing management system of information security.
{"title":"Study on Management System for Information Security","authors":"Sumedh Rawat","doi":"10.46610/jooce.2022.v08i02.005","DOIUrl":"https://doi.org/10.46610/jooce.2022.v08i02.005","url":null,"abstract":"According to the relevance of the existing information's role in various companies, competent management is required to ensure the security of that information. The information security refers to protecting information and minimizing unauthorized access to it. Management system of the information security means the information security of a part of general and overall information security in an organization that is based on business risks’ approach and aims to establish, implement, operate, monitor, verify, maintain and improve information security. In this study, we have tried to introduce information security management system, types of threatening risks of information systems and also introduce and offer proper ways to maintain information security of each organization and then work on necessary requirements in order to design information security system and phases of implementing management system of information security.","PeriodicalId":159105,"journal":{"name":"Journal of Optical Communication Electronics","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116723314","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-08-31DOI: 10.46610/jooce.2022.v08i02.004
Ajay Bhatia, Vikrant Sharma
Fiber optic connection is the best option for data transmission at gigabit and above rates. Voice, video, telemetry, and data are all transmitted using this method of communication over great distances and over computer networks or local area networks. By converting electronic signals into light, a fibre optic communication system uses light-wave technology to transfer data via fiber. Large bandwidth, smaller diameter, lightweight, long-distance signal transmission, low attenuation, transmission security, and other outstanding characteristics of this type of communication system make it a key component of any telecommunications infrastructure. The characteristic traits, fundamental components, and other aspects of fibre optic communication systems are highlighted in the information that follows.
{"title":"Elements of a Fiber Optic Communication System","authors":"Ajay Bhatia, Vikrant Sharma","doi":"10.46610/jooce.2022.v08i02.004","DOIUrl":"https://doi.org/10.46610/jooce.2022.v08i02.004","url":null,"abstract":"Fiber optic connection is the best option for data transmission at gigabit and above rates. Voice, video, telemetry, and data are all transmitted using this method of communication over great distances and over computer networks or local area networks. By converting electronic signals into light, a fibre optic communication system uses light-wave technology to transfer data via fiber. Large bandwidth, smaller diameter, lightweight, long-distance signal transmission, low attenuation, transmission security, and other outstanding characteristics of this type of communication system make it a key component of any telecommunications infrastructure. The characteristic traits, fundamental components, and other aspects of fibre optic communication systems are highlighted in the information that follows.","PeriodicalId":159105,"journal":{"name":"Journal of Optical Communication Electronics","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115149106","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-08-21DOI: 10.46610/jooce.2022.v08i02.003
Tilak Mukherjee
In the modern scenario, optical fiber communication technology has rapidly progressed with continuous exploration of emerging technologies to support more amount of bandwidth, higher data rate and improved security along with reduction in losses and electromagnetic immunity. Optical fiber communication system has remarkably low loss and is reliably capable of meeting the demand of massively increased information traffic employing a minimum number of repeaters in its performance link. In this paper, we discuss broadly optical fiber technology theory, types, working principle with its various merits and demerits in the application scenario. Single-mode graded index fiber has been analyzed in comparison to multi-mode fibers and it has emerged as the most efficient means of broad band signal transmission offering many distinct advantages. The possible consequences of both linear and nonlinear effects of the optical fiber and other limiting factors that influence the performance of propagation characteristics have been discussed which are reasonably relevant to the emerging areas of optical engineering ,photonics and related fiber optic devices.
{"title":"Optical Fiber Communication System and Nonlinear Effects: A Brief Insight","authors":"Tilak Mukherjee","doi":"10.46610/jooce.2022.v08i02.003","DOIUrl":"https://doi.org/10.46610/jooce.2022.v08i02.003","url":null,"abstract":"In the modern scenario, optical fiber communication technology has rapidly progressed with continuous exploration of emerging technologies to support more amount of bandwidth, higher data rate and improved security along with reduction in losses and electromagnetic immunity. Optical fiber communication system has remarkably low loss and is reliably capable of meeting the demand of massively increased information traffic employing a minimum number of repeaters in its performance link. In this paper, we discuss broadly optical fiber technology theory, types, working principle with its various merits and demerits in the application scenario. Single-mode graded index fiber has been analyzed in comparison to multi-mode fibers and it has emerged as the most efficient means of broad band signal transmission offering many distinct advantages. The possible consequences of both linear and nonlinear effects of the optical fiber and other limiting factors that influence the performance of propagation characteristics have been discussed which are reasonably relevant to the emerging areas of optical engineering ,photonics and related fiber optic devices.","PeriodicalId":159105,"journal":{"name":"Journal of Optical Communication Electronics","volume":"2015 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127667130","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-06-23DOI: 10.46610/jooce.2022.v08i02.002
B. K. Reddy, M. Harish, P. H. Kumar, K. Aashish, Dr. N. Ramamurthy
The primary extent of this task is to comprehend how to best use different distributed computing administrations to get great execution for less expense. Amazon surrenders a marvelous arrangement of web helps that enables fashioners to make dynamic and generous applications. Conveying on AWS can save you time, money and work diverged from building and staying aware of additional customary frameworks. Amazon Web Services offers a wide plan of overall cloud-based things including process, limit, informational collections, assessment, coordinating, flexible, engineer gadgets, the board contraptions, IoT, security, and try applications: on- demand, open quite promptly, with pay-all the more just as expenses emerge esteeming. From data warehousing to association instruments, lists to content transport, more than 200 AWS organizations are available. New organizations can be provisioned quickly, without the blunt capital expense. Today, AWS gives a significantly trustworthy, flexible, negligible cost establishment stage in the cloud that controls a colossal number of associations in 190 countries all over the planet. This licenses adventures, new organizations, little and medium-sized associations and clients in the public region to get to the construction blocks they need to answer quickly to changing business essentials. Amazon EC2 (Elastic Compute Cloud), VPC (Virtual Private Cloud), IAM (Identity And Access Management), Cloud Watch, CDN (Content Delivery Network) and Route 53 are used here since it is very popular in giving extraordinary disseminated figuring organizations. In this report, I'll tell you, step by step, through the procedure of using the AWS Marketplace to game plan and produce another AWS Cloud server. In this task we furthermore used progression gadgets like GIT and Jenkins for robotization.
本任务的主要范围是了解如何最好地使用不同的分布式计算管理,以更少的费用获得更好的执行。亚马逊放弃了一种奇妙的网络帮助安排,使时尚人士能够制作动态和慷慨的应用程序。在AWS上进行传输可以节省您的时间、金钱和工作,而不必构建和了解其他习惯框架。亚马逊网络服务(Amazon Web Services)提供了一个广泛的基于云的整体计划,包括流程、限制、信息收集、评估、协调、灵活、工程师小工具、董事会装置、物联网、安全性和尝试应用程序:按需、快速开放、付费——所有这些都是随着费用的增加而增加的。从数据仓库到关联工具,从列表到内容传输,有200多个AWS组织可用。新的组织可以快速配置,而不需要直接的资本支出。今天,AWS在云中提供了一个非常值得信赖、灵活、成本可以忽略不计的建立阶段,控制着全球190个国家的大量协会。这使得冒险、新组织、中小型协会和公共区域的客户能够快速响应不断变化的业务需求。这里使用了Amazon EC2(弹性计算云)、VPC(虚拟私有云)、IAM(身份和访问管理)、Cloud Watch、CDN(内容分发网络)和Route 53,因为它在提供非凡的分布式计算组织中非常受欢迎。在这篇报告中,我将一步一步地告诉你,通过使用AWS市场来规划和生产另一个AWS云服务器的过程。在这个任务中,我们进一步使用进度小工具,如GIT和Jenkins机器人化。
{"title":"E-Commerce Website Hosting Using AWS Cloud Services","authors":"B. K. Reddy, M. Harish, P. H. Kumar, K. Aashish, Dr. N. Ramamurthy","doi":"10.46610/jooce.2022.v08i02.002","DOIUrl":"https://doi.org/10.46610/jooce.2022.v08i02.002","url":null,"abstract":"The primary extent of this task is to comprehend how to best use different distributed computing administrations to get great execution for less expense. Amazon surrenders a marvelous arrangement of web helps that enables fashioners to make dynamic and generous applications. Conveying on AWS can save you time, money and work diverged from building and staying aware of additional customary frameworks. Amazon Web Services offers a wide plan of overall cloud-based things including process, limit, informational collections, assessment, coordinating, flexible, engineer gadgets, the board contraptions, IoT, security, and try applications: on- demand, open quite promptly, with pay-all the more just as expenses emerge esteeming. From data warehousing to association instruments, lists to content transport, more than 200 AWS organizations are available. New organizations can be provisioned quickly, without the blunt capital expense. Today, AWS gives a significantly trustworthy, flexible, negligible cost establishment stage in the cloud that controls a colossal number of associations in 190 countries all over the planet. This licenses adventures, new organizations, little and medium-sized associations and clients in the public region to get to the construction blocks they need to answer quickly to changing business essentials. Amazon EC2 (Elastic Compute Cloud), VPC (Virtual Private Cloud), IAM (Identity And Access Management), Cloud Watch, CDN (Content Delivery Network) and Route 53 are used here since it is very popular in giving extraordinary disseminated figuring organizations. In this report, I'll tell you, step by step, through the procedure of using the AWS Marketplace to game plan and produce another AWS Cloud server. In this task we furthermore used progression gadgets like GIT and Jenkins for robotization.","PeriodicalId":159105,"journal":{"name":"Journal of Optical Communication Electronics","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125131984","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-06-15DOI: 10.46610/jooce.2022.v08i02.001
M. G. Ramarao, G. Aravind, S. Aftab, M. Gowtham, G. Charan
When we use a capturing device to capture digital displays, we obtain a vivid rainbow pattern. It's known as "moiré" and it has an impact on image quality and subsequent processing. There are several ways to save money. Modern approaches for eliminating moiré patterns rely on down sampling pooling layers to retrieve multiscale information, which might result in data loss. To show this issue, this research provides a wavelet-based demoiréing approach. Both Inverse Discrete Wavelet Transform (IDWT) and Discrete Wavelet Transform (DWT) are used in this. This technology may efficiently enhance the network related field without any data loss in place of standard down sampling and up sampling. Furthermore, this approach employs an effective attention fusion module to reconstruct additional details of moiré patterns (EAFM). Using an aggregate of green channel attention (ECA), spatial attention (SA), and neighborhood residual getting to know, this module can self-adaptively study several weights of function statistics at distinct degrees and encourage the community to cognizance extra on required statistics as moiré statistics to beautify the getting to know and demoiréing paintings performed via way of means of enhancing photograph excellent and offering the specified Accurate output. Extensive trials the usage of publicly to be had datasets have established that this approach can perpetually cast off moiré styles even as additionally being quantitatively and qualitatively sound.
当我们使用捕获设备捕获数字显示器时,我们获得了生动的彩虹图案。它被称为“moir”,它对图像质量和后续处理有影响。省钱的方法有很多。现代的消除不规则模式的方法依赖于下采样池层来检索多尺度信息,这可能导致数据丢失。为了说明这个问题,本研究提供了一种基于小波的分解方法。离散小波逆变换(IDWT)和离散小波变换(DWT)都被用于该方法。该技术可以有效地增强网络相关领域的性能,而不丢失任何数据,取代了标准的下采样和上采样。此外,该方法采用了一个有效的注意力融合模块来重建动态模式(EAFM)的附加细节。该模块利用绿色通道关注(ECA)、空间关注(SA)和邻域残差知晓(neighborhood residual getting to know)的集合,在不同程度上自适应地学习函数统计的若干权重,并鼓励社区将额外需要的统计识别为moir统计,通过提高照片优秀性和提供指定的精确输出的方式来美化了解和分解绘画。大量使用公开数据集的试验表明,这种方法可以永远摆脱moir风格,即使在数量和质量上都是合理的。
{"title":"Demoiring Images using Efficient Attention Fusion module in Wavelet Domain","authors":"M. G. Ramarao, G. Aravind, S. Aftab, M. Gowtham, G. Charan","doi":"10.46610/jooce.2022.v08i02.001","DOIUrl":"https://doi.org/10.46610/jooce.2022.v08i02.001","url":null,"abstract":"When we use a capturing device to capture digital displays, we obtain a vivid rainbow pattern. It's known as \"moiré\" and it has an impact on image quality and subsequent processing. There are several ways to save money. Modern approaches for eliminating moiré patterns rely on down sampling pooling layers to retrieve multiscale information, which might result in data loss. To show this issue, this research provides a wavelet-based demoiréing approach. Both Inverse Discrete Wavelet Transform (IDWT) and Discrete Wavelet Transform (DWT) are used in this. This technology may efficiently enhance the network related field without any data loss in place of standard down sampling and up sampling. Furthermore, this approach employs an effective attention fusion module to reconstruct additional details of moiré patterns (EAFM). Using an aggregate of green channel attention (ECA), spatial attention (SA), and neighborhood residual getting to know, this module can self-adaptively study several weights of function statistics at distinct degrees and encourage the community to cognizance extra on required statistics as moiré statistics to beautify the getting to know and demoiréing paintings performed via way of means of enhancing photograph excellent and offering the specified Accurate output. Extensive trials the usage of publicly to be had datasets have established that this approach can perpetually cast off moiré styles even as additionally being quantitatively and qualitatively sound.","PeriodicalId":159105,"journal":{"name":"Journal of Optical Communication Electronics","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121357682","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-01-05DOI: 10.46610/jooce.2021.v07i03.004
D. Singh, B. B. Tiwari
{"title":"Hybrid FSO-RF Turbulent Link Performance under Misalignment Aperture Error","authors":"D. Singh, B. B. Tiwari","doi":"10.46610/jooce.2021.v07i03.004","DOIUrl":"https://doi.org/10.46610/jooce.2021.v07i03.004","url":null,"abstract":"","PeriodicalId":159105,"journal":{"name":"Journal of Optical Communication Electronics","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121745205","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}