Pub Date : 2014-03-17DOI: 10.1109/ICECI.2014.6767388
Tania Das, N. Das
The paper provides an analysis of different sizes red blood corpuscles (RBC) using surface Plasmon resonance (SPR) sensor. Change of RBC size affects the change of refractive index. SPR sensor is sensitive towards this small change of refractive index. A general formula is given in this paper such that just observing the output intensity of SPR sensor, the size of the RBC present as dielectric at the interface of metal in SPR sensor can be determined.
{"title":"Analysis of size distribution of red blood corpuscles using surface Plasmon resonance sensor for medical diagnosis","authors":"Tania Das, N. Das","doi":"10.1109/ICECI.2014.6767388","DOIUrl":"https://doi.org/10.1109/ICECI.2014.6767388","url":null,"abstract":"The paper provides an analysis of different sizes red blood corpuscles (RBC) using surface Plasmon resonance (SPR) sensor. Change of RBC size affects the change of refractive index. SPR sensor is sensitive towards this small change of refractive index. A general formula is given in this paper such that just observing the output intensity of SPR sensor, the size of the RBC present as dielectric at the interface of metal in SPR sensor can be determined.","PeriodicalId":315219,"journal":{"name":"International Conference on Electronics, Communication and Instrumentation (ICECI)","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-03-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126828326","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-03-17DOI: 10.1109/ICECI.2014.6767387
S. Pain, R. Anthony, Sanchita Goswami, Debolina Brahma, Sambhunath Biswas
In an Erbium Doped Fiber Amplifier the gain and noise figure are strongly dependent on fiber length. This paper presents simulative studies on Length Dependent Gain and Noise Figure Analysis in a Dual Stage L-Band EDFA WDM Network. A high gain of 42dB was obtained at 1562nm wavelength with a total EDF (EDF-I 5m and EDF-II 5m) length of 10m and total pump power (980nm pump and 1480nm pump) of 270mW. Low noise figure of less than 4.7dB occurs in the entire wavelength range (1561nm-1617nm). A high Power Conversion Efficiency of 48% and Quantum Conversion Efficiency of 60% has been obtained. This paper also studies the variation of gain and noise figure with varying temperature and fiber length. The configuration discussed in this capable of successfully implemented for L-band amplification with high gain and low noise figure.
在掺铒光纤放大器中,增益和噪声系数与光纤长度密切相关。本文对双级l波段EDFA WDM网络的长度相关增益和噪声图分析进行了仿真研究。在1562nm波长处获得了42dB的高增益,总EDF (EDF- i 5m和EDF- ii 5m)长度为10m,总泵浦功率(980nm泵浦和1480nm泵浦)为270mW。整个波长范围(1561nm-1617nm)噪声系数低于4.7dB。获得了48%的功率转换效率和60%的量子转换效率。本文还研究了增益和噪声系数随温度和光纤长度的变化。本文所讨论的结构能够成功地实现l波段高增益和低噪声系数的放大。
{"title":"Analysis of Length Dependent Gain and Noise Figure in a Dual Stage L-Band EDFA configuration","authors":"S. Pain, R. Anthony, Sanchita Goswami, Debolina Brahma, Sambhunath Biswas","doi":"10.1109/ICECI.2014.6767387","DOIUrl":"https://doi.org/10.1109/ICECI.2014.6767387","url":null,"abstract":"In an Erbium Doped Fiber Amplifier the gain and noise figure are strongly dependent on fiber length. This paper presents simulative studies on Length Dependent Gain and Noise Figure Analysis in a Dual Stage L-Band EDFA WDM Network. A high gain of 42dB was obtained at 1562nm wavelength with a total EDF (EDF-I 5m and EDF-II 5m) length of 10m and total pump power (980nm pump and 1480nm pump) of 270mW. Low noise figure of less than 4.7dB occurs in the entire wavelength range (1561nm-1617nm). A high Power Conversion Efficiency of 48% and Quantum Conversion Efficiency of 60% has been obtained. This paper also studies the variation of gain and noise figure with varying temperature and fiber length. The configuration discussed in this capable of successfully implemented for L-band amplification with high gain and low noise figure.","PeriodicalId":315219,"journal":{"name":"International Conference on Electronics, Communication and Instrumentation (ICECI)","volume":"106 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-03-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133020714","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-03-17DOI: 10.1109/ICECI.2014.6767367
T. Chattopadhyay, Sumit Banerjee, C. K. Chanda
The paper presents voltage stability analysis of radial distribution networks under critical loading conditions without and with distributed generator (DG) for composite loads. A new voltage stability index is proposed for identifying the node, which is most sensitive to voltage collapse. The effectiveness of the proposed method without and with considering DG for loads of composite types has been successfully tested on a 12.66 kV radial distribution network consisting of 33 nodes and the results are found to be in very good agreement.
{"title":"Impact of distributed generator on voltage stability analysis of distribution networks under critical loading conditions for composite loads","authors":"T. Chattopadhyay, Sumit Banerjee, C. K. Chanda","doi":"10.1109/ICECI.2014.6767367","DOIUrl":"https://doi.org/10.1109/ICECI.2014.6767367","url":null,"abstract":"The paper presents voltage stability analysis of radial distribution networks under critical loading conditions without and with distributed generator (DG) for composite loads. A new voltage stability index is proposed for identifying the node, which is most sensitive to voltage collapse. The effectiveness of the proposed method without and with considering DG for loads of composite types has been successfully tested on a 12.66 kV radial distribution network consisting of 33 nodes and the results are found to be in very good agreement.","PeriodicalId":315219,"journal":{"name":"International Conference on Electronics, Communication and Instrumentation (ICECI)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-03-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128471542","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-03-17DOI: 10.1109/ICECI.2014.6767358
Avisankar Roy, Praveen Kumar Choudhary, S. Anand, P. Sarkar, S. Bhunia
A novel approach on miniaturization of microstrip patch antenna with multi frequency operation is proposed in this article. In this paper we introduce symmetrical strips in both non radiating side of single layered, single coaxial fed rectangular microstrip patch antenna. It has been investigated that the strip loaded microstrip patch antenna radiates multiple frequencies and about 82% size reduction has been achieved. This result has been found by cutting slot on the patch and taking the ground plane is almost three times larger than the radiating patch.
{"title":"A novel approach on miniaturization of microstrip patch antenna with loaded strips","authors":"Avisankar Roy, Praveen Kumar Choudhary, S. Anand, P. Sarkar, S. Bhunia","doi":"10.1109/ICECI.2014.6767358","DOIUrl":"https://doi.org/10.1109/ICECI.2014.6767358","url":null,"abstract":"A novel approach on miniaturization of microstrip patch antenna with multi frequency operation is proposed in this article. In this paper we introduce symmetrical strips in both non radiating side of single layered, single coaxial fed rectangular microstrip patch antenna. It has been investigated that the strip loaded microstrip patch antenna radiates multiple frequencies and about 82% size reduction has been achieved. This result has been found by cutting slot on the patch and taking the ground plane is almost three times larger than the radiating patch.","PeriodicalId":315219,"journal":{"name":"International Conference on Electronics, Communication and Instrumentation (ICECI)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-03-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121931045","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-03-17DOI: 10.1109/ICECI.2014.6767365
A. Basu, Anisha Halder
The paper provides a novel approach to emotion recognition from facial expression and Electro Encephalograph (EEG) signal of subjects. Five subjects are requested to watch particular videos for arousing five different emotions in their mind. The facial expressions and EEG signal of subjects are recorded by a good quality camera and EEG machine respectively while watching the movie clips. Facial features include mouth-opening, eye-opening, eyebrow-constriction, and EEG features include, 132 number of Wavelet coefficients, 16 numbers of Kalman Filter coefficients and power spectral density, are then extracted from the facial expression and EEG signal frames. Then these huge numbers of features are reduced by Principle Component Analysis (PCA) and feature vector is constructed for 5 different emotions. A linear Support Vector Machine classifier is used to classify the extracted feature vectors into different emotion classes. Experimental results confirm that the recognition accuracy of emotion up to a level of 97% is maintained, even when the mean and standard deviation of noise are as high as 5% and 20% respectively over the individual features.
{"title":"Facial expression and EEG signal based classification of emotion","authors":"A. Basu, Anisha Halder","doi":"10.1109/ICECI.2014.6767365","DOIUrl":"https://doi.org/10.1109/ICECI.2014.6767365","url":null,"abstract":"The paper provides a novel approach to emotion recognition from facial expression and Electro Encephalograph (EEG) signal of subjects. Five subjects are requested to watch particular videos for arousing five different emotions in their mind. The facial expressions and EEG signal of subjects are recorded by a good quality camera and EEG machine respectively while watching the movie clips. Facial features include mouth-opening, eye-opening, eyebrow-constriction, and EEG features include, 132 number of Wavelet coefficients, 16 numbers of Kalman Filter coefficients and power spectral density, are then extracted from the facial expression and EEG signal frames. Then these huge numbers of features are reduced by Principle Component Analysis (PCA) and feature vector is constructed for 5 different emotions. A linear Support Vector Machine classifier is used to classify the extracted feature vectors into different emotion classes. Experimental results confirm that the recognition accuracy of emotion up to a level of 97% is maintained, even when the mean and standard deviation of noise are as high as 5% and 20% respectively over the individual features.","PeriodicalId":315219,"journal":{"name":"International Conference on Electronics, Communication and Instrumentation (ICECI)","volume":"102 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-03-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114623474","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-03-17DOI: 10.1109/ICECI.2014.6767373
J. Dey, T. Saha, Jitesh Chandra Barman
This paper presents a digital control scheme for wind turbine emulator. The wind turbine is emulated with a separately excited dc motor. The controller is considered to be in the proportional-integral (PI) form, and is designed in digital time domain. These digital PI controllers are employed here for both speed and current controls. The performance of the digital control scheme proposed is simulated in MATLAB-SIMULINK environment considering the dc motor to be a continuous-time plant. The digital controllers are shown to exhibit successful tracking of the speed reference command. The veracity of the simulation results are established through real-time implementation of the digital control scheme for the dc motor under consideration. The digital control is implemented here with a digital signal processor (DSP) control board dSPACE1104. The experimental results are found out to be in good agreement with that obtained in simulation.
{"title":"Performance analysis of a digitally controlled wind turbine emulator","authors":"J. Dey, T. Saha, Jitesh Chandra Barman","doi":"10.1109/ICECI.2014.6767373","DOIUrl":"https://doi.org/10.1109/ICECI.2014.6767373","url":null,"abstract":"This paper presents a digital control scheme for wind turbine emulator. The wind turbine is emulated with a separately excited dc motor. The controller is considered to be in the proportional-integral (PI) form, and is designed in digital time domain. These digital PI controllers are employed here for both speed and current controls. The performance of the digital control scheme proposed is simulated in MATLAB-SIMULINK environment considering the dc motor to be a continuous-time plant. The digital controllers are shown to exhibit successful tracking of the speed reference command. The veracity of the simulation results are established through real-time implementation of the digital control scheme for the dc motor under consideration. The digital control is implemented here with a digital signal processor (DSP) control board dSPACE1104. The experimental results are found out to be in good agreement with that obtained in simulation.","PeriodicalId":315219,"journal":{"name":"International Conference on Electronics, Communication and Instrumentation (ICECI)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-03-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130895776","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-03-17DOI: 10.1109/ICECI.2014.6767377
Mozmin Ahmed, M. Hussain
In Mobile Adhoc Networks (MANETs), more security is required in the system compared to the wired Network. The Wireless networks are susceptible to many attacks like Black Hole Attacks, Gray Hole Attacks, Worm Hole Attacks, Sink Hole, Sleep Deprivation Torture, Sybil Attack etc. These Networks needs to be protected using firewalls, encryption software, network failure detection schemes for detecting the attacks and minimizing their effects. Many of these schemes designed so far are not absolute and require more supporting systems. Therefore an effective intrusion detection system (IDS) is important to identify the malicious nodes, isolate the problem created by such nodes and notify the information of the malicious node to the other nodes. The ultimate aim of these schemes is to provide the necessary security cover to the network by adding encryption to maintain confidentiality and integrity. In this paper, we introduce a novel Intrusion Detection System (IDS) and examine the performance of the network by introducing. Black Hole Attack and Gray Hole Attack. The proposed work is simulated using ns 2.35 in Debian Linux 6. The result of simulations shows the comparison considering the total packet drop and network throughput. The AODV [1][2] protocol in ns is modified (blackholeaodv and grayholeaodv protocol) to simulate both the attacks. Similarly, the AODV protocol is modified (idsaodv protocol) to implement the IDS (Intrusion Detection System) for the attacks [4][6].
在移动自组网(manet)中,与有线网络相比,对系统的安全性要求更高。无线网络容易受到许多攻击,如黑洞攻击,灰洞攻击,虫洞攻击,下沉洞,睡眠剥夺折磨,Sybil攻击等。这些网络需要使用防火墙、加密软件、网络故障检测方案来保护,以检测攻击并尽量减少其影响。目前设计的许多方案都不是绝对的,需要更多的支持系统。因此,一个有效的入侵检测系统(IDS)对于识别恶意节点,隔离这些节点产生的问题,并将恶意节点的信息通知给其他节点至关重要。这些方案的最终目的是通过添加加密来为网络提供必要的安全保护,以保持机密性和完整性。本文介绍了一种新的入侵检测系统(IDS),并通过引入入侵检测系统来检验网络的性能。黑洞攻击和灰洞攻击。本文在Debian Linux 6中使用ns 2.35进行了仿真。仿真结果显示了考虑总丢包量和网络吞吐量的比较。修改了ns中的AODV[1][2]协议(blackholeaodv和grayholeaodv协议)来模拟这两种攻击。类似地,对AODV协议进行修改(idsaodv协议)来实现针对攻击的IDS (Intrusion Detection System)[4][6]。
{"title":"Performance of an IDS in an Adhoc Network under Black Hole and Gray Hole attacks","authors":"Mozmin Ahmed, M. Hussain","doi":"10.1109/ICECI.2014.6767377","DOIUrl":"https://doi.org/10.1109/ICECI.2014.6767377","url":null,"abstract":"In Mobile Adhoc Networks (MANETs), more security is required in the system compared to the wired Network. The Wireless networks are susceptible to many attacks like Black Hole Attacks, Gray Hole Attacks, Worm Hole Attacks, Sink Hole, Sleep Deprivation Torture, Sybil Attack etc. These Networks needs to be protected using firewalls, encryption software, network failure detection schemes for detecting the attacks and minimizing their effects. Many of these schemes designed so far are not absolute and require more supporting systems. Therefore an effective intrusion detection system (IDS) is important to identify the malicious nodes, isolate the problem created by such nodes and notify the information of the malicious node to the other nodes. The ultimate aim of these schemes is to provide the necessary security cover to the network by adding encryption to maintain confidentiality and integrity. In this paper, we introduce a novel Intrusion Detection System (IDS) and examine the performance of the network by introducing. Black Hole Attack and Gray Hole Attack. The proposed work is simulated using ns 2.35 in Debian Linux 6. The result of simulations shows the comparison considering the total packet drop and network throughput. The AODV [1][2] protocol in ns is modified (blackholeaodv and grayholeaodv protocol) to simulate both the attacks. Similarly, the AODV protocol is modified (idsaodv protocol) to implement the IDS (Intrusion Detection System) for the attacks [4][6].","PeriodicalId":315219,"journal":{"name":"International Conference on Electronics, Communication and Instrumentation (ICECI)","volume":"355 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-03-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114752949","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-03-17DOI: 10.1109/ICECI.2014.6767372
Prarthana Mukherjee, Ankita Hajra, Sauro Ghosal, Soumyo Chatterjee, S. Chatterjee
In this paper, a novel method for null placements in beam steered linear array with unequal excitation amplitude and uniform inter-element spacing has been presented. The proposed method has been developed using Taylor one parameter distribution for linear array and particle swarm optimization (PSO). The beam steering has been achieved by maintaining a constant phase difference between two consecutive elements of the array. In order to place nulls in the desired direction excitation amplitude perturbation method using PSO has been considered. Search space of PSO has been defined using Taylor one parameter distribution for linear array. Within the defined search space PSO with the null placement objective. The proposed method has been tested for both single and wide null objectives. As example 12 elements linear array has been considered, for both single and wide null placement objective. Results show that, null level in the desired directions lies within 89% to 100% of desired null level of -60 dB, which in turn proves the effectiveness of the proposed method.
{"title":"Null placements in non-uniformly excited beam steered linear array using particle swarm optimization","authors":"Prarthana Mukherjee, Ankita Hajra, Sauro Ghosal, Soumyo Chatterjee, S. Chatterjee","doi":"10.1109/ICECI.2014.6767372","DOIUrl":"https://doi.org/10.1109/ICECI.2014.6767372","url":null,"abstract":"In this paper, a novel method for null placements in beam steered linear array with unequal excitation amplitude and uniform inter-element spacing has been presented. The proposed method has been developed using Taylor one parameter distribution for linear array and particle swarm optimization (PSO). The beam steering has been achieved by maintaining a constant phase difference between two consecutive elements of the array. In order to place nulls in the desired direction excitation amplitude perturbation method using PSO has been considered. Search space of PSO has been defined using Taylor one parameter distribution for linear array. Within the defined search space PSO with the null placement objective. The proposed method has been tested for both single and wide null objectives. As example 12 elements linear array has been considered, for both single and wide null placement objective. Results show that, null level in the desired directions lies within 89% to 100% of desired null level of -60 dB, which in turn proves the effectiveness of the proposed method.","PeriodicalId":315219,"journal":{"name":"International Conference on Electronics, Communication and Instrumentation (ICECI)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-03-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130577327","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-03-17DOI: 10.1109/ICECI.2014.6767369
Sohum Misra
Large scale adoption of smart devices like smart mobile phones for personal usage has opened up an opportunity to identify individuals via their smart device identities. This paper aims to achieve very simple technique of users' access control through device authentication using a microcontroller board such as Arduino that interacts with the smart device using Bluetooth technology which is almost available in every smart device. The implementation procedure is discussed through the experimentation. As a methodology of secured communication, password protection is used in the mobile apps. Some possible application areas are discussed in which the proposed methodology may be applied to enable appropriate services. The novelty of this work is to provide a simple and low cost solution for users' access in a secured protected place. Further, the proposed authentication mechanisms are intuitive and require minimum effort.
{"title":"A very simple user access control technique through smart device authentication using Bluetooth communication","authors":"Sohum Misra","doi":"10.1109/ICECI.2014.6767369","DOIUrl":"https://doi.org/10.1109/ICECI.2014.6767369","url":null,"abstract":"Large scale adoption of smart devices like smart mobile phones for personal usage has opened up an opportunity to identify individuals via their smart device identities. This paper aims to achieve very simple technique of users' access control through device authentication using a microcontroller board such as Arduino that interacts with the smart device using Bluetooth technology which is almost available in every smart device. The implementation procedure is discussed through the experimentation. As a methodology of secured communication, password protection is used in the mobile apps. Some possible application areas are discussed in which the proposed methodology may be applied to enable appropriate services. The novelty of this work is to provide a simple and low cost solution for users' access in a secured protected place. Further, the proposed authentication mechanisms are intuitive and require minimum effort.","PeriodicalId":315219,"journal":{"name":"International Conference on Electronics, Communication and Instrumentation (ICECI)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-03-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121471168","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-03-17DOI: 10.1109/ICECI.2014.6767371
P. Das, S. B. Belamgi, S. Ray
Non Destructive Testing (NDT) technique is one of the most challenging areas for researchers working in the field of microwave. In the present paper, use of open-ended T-Junction sensor was studied for detection of 3D cracks with rectangular aperture on a metal surface in X-Band. This technique shows better resolution with compared to other reported microwave NDT techniques.
{"title":"Non destructive crack detection at X-band","authors":"P. Das, S. B. Belamgi, S. Ray","doi":"10.1109/ICECI.2014.6767371","DOIUrl":"https://doi.org/10.1109/ICECI.2014.6767371","url":null,"abstract":"Non Destructive Testing (NDT) technique is one of the most challenging areas for researchers working in the field of microwave. In the present paper, use of open-ended T-Junction sensor was studied for detection of 3D cracks with rectangular aperture on a metal surface in X-Band. This technique shows better resolution with compared to other reported microwave NDT techniques.","PeriodicalId":315219,"journal":{"name":"International Conference on Electronics, Communication and Instrumentation (ICECI)","volume":"88 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-03-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131611882","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}