Pub Date : 2016-02-01DOI: 10.1109/STARTUP.2016.7583953
Hashim Masod Kahily, A. Sudheer
This paper presents a prototype of a military robot which implements an application of real time detection and tracking of human beings. A depth sensing camera system by Microsoft Kinect is utilized on a physical robot for human detection and aiming in both static and dynamic modes of operation. Human detection in the static mode is obtained by using APIs of Open Natural Interaction (OpenNI) framework and the aiming routine is carried out using Regression Analysis between image pixels and the gun control motors. In the dynamic mode, human detection is done by implementing several algorithms such as voxelization of point clouds, RANSAC, and Histogram of Oriented Gradients in Point Cloud Library and the aiming routine is carried out using inverse kinematics.
{"title":"Real-time human detection and tracking from a mobile armed robot using RGB-D sensor","authors":"Hashim Masod Kahily, A. Sudheer","doi":"10.1109/STARTUP.2016.7583953","DOIUrl":"https://doi.org/10.1109/STARTUP.2016.7583953","url":null,"abstract":"This paper presents a prototype of a military robot which implements an application of real time detection and tracking of human beings. A depth sensing camera system by Microsoft Kinect is utilized on a physical robot for human detection and aiming in both static and dynamic modes of operation. Human detection in the static mode is obtained by using APIs of Open Natural Interaction (OpenNI) framework and the aiming routine is carried out using Regression Analysis between image pixels and the gun control motors. In the dynamic mode, human detection is done by implementing several algorithms such as voxelization of point clouds, RANSAC, and Histogram of Oriented Gradients in Point Cloud Library and the aiming routine is carried out using inverse kinematics.","PeriodicalId":355852,"journal":{"name":"2016 World Conference on Futuristic Trends in Research and Innovation for Social Welfare (Startup Conclave)","volume":"195 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132545234","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-02-01DOI: 10.1109/STARTUP.2016.7583954
Sushant Agrawal, Vikash Kumar, N. Anand, V. Agarwal, A. Islam
This paper proposes the design, analysis and processing methodologies for the data generated by the custom designed data logger for quick deployment. The primary goal is to develop a prototype system for automobiles which can reduce the `Acquisition to Analysis' time for the generated data. The proposed data acquisition (DAQ) system is rugged and modular. Since most existing DAQ systems fail for automotive use due to their application-specific nature and lack of data filtering and processing capabilities. The system so developed, log data at a baud rate of 9600 bps and employ 10-bit resolution for the representation of analog data from the sensor. This coupled with data logging using SD card shield V3.0 and data analysis on MATLAB graphical user interface helps to reduce the testing and prototyping time of vehicle under test.
{"title":"Development of data acquisition system and data analysis technique for automotive applications","authors":"Sushant Agrawal, Vikash Kumar, N. Anand, V. Agarwal, A. Islam","doi":"10.1109/STARTUP.2016.7583954","DOIUrl":"https://doi.org/10.1109/STARTUP.2016.7583954","url":null,"abstract":"This paper proposes the design, analysis and processing methodologies for the data generated by the custom designed data logger for quick deployment. The primary goal is to develop a prototype system for automobiles which can reduce the `Acquisition to Analysis' time for the generated data. The proposed data acquisition (DAQ) system is rugged and modular. Since most existing DAQ systems fail for automotive use due to their application-specific nature and lack of data filtering and processing capabilities. The system so developed, log data at a baud rate of 9600 bps and employ 10-bit resolution for the representation of analog data from the sensor. This coupled with data logging using SD card shield V3.0 and data analysis on MATLAB graphical user interface helps to reduce the testing and prototyping time of vehicle under test.","PeriodicalId":355852,"journal":{"name":"2016 World Conference on Futuristic Trends in Research and Innovation for Social Welfare (Startup Conclave)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114639300","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-02-01DOI: 10.1109/STARTUP.2016.7583927
C. Raut
The interest in data hiding has increased with the recent activity in digital copyright protection. One way to protect the image is to secretely embed data in the content of the image. The content owner hide the original message using hiding key in any cover medium. The receiver does these processes in reverse for getting back the original message the data hiding key is employed to extract the secret message and get back the original content. In this paper we will present the overview on the use of data hiding technique using the improved LSB on video. One of the major disadvantage with simple LSB method is that, while inserting the secrete data into the target image it can change the least significant bit of all the image pixel. In this way hidden message will be destroyed by changing the quality of image. In order to overcome that limitations we are proposing improved LSB with 1,4,3 bit position technique is currently being developed. We are using the block size 4×4 to hide data. This paper will review development in data hiding technique, specifically it is secure data hiding in the image.
{"title":"Data hiding technique in video using a secrete key","authors":"C. Raut","doi":"10.1109/STARTUP.2016.7583927","DOIUrl":"https://doi.org/10.1109/STARTUP.2016.7583927","url":null,"abstract":"The interest in data hiding has increased with the recent activity in digital copyright protection. One way to protect the image is to secretely embed data in the content of the image. The content owner hide the original message using hiding key in any cover medium. The receiver does these processes in reverse for getting back the original message the data hiding key is employed to extract the secret message and get back the original content. In this paper we will present the overview on the use of data hiding technique using the improved LSB on video. One of the major disadvantage with simple LSB method is that, while inserting the secrete data into the target image it can change the least significant bit of all the image pixel. In this way hidden message will be destroyed by changing the quality of image. In order to overcome that limitations we are proposing improved LSB with 1,4,3 bit position technique is currently being developed. We are using the block size 4×4 to hide data. This paper will review development in data hiding technique, specifically it is secure data hiding in the image.","PeriodicalId":355852,"journal":{"name":"2016 World Conference on Futuristic Trends in Research and Innovation for Social Welfare (Startup Conclave)","volume":"14 5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133607813","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-02-01DOI: 10.1109/STARTUP.2016.7583951
P. Sakthivel, S. Ganeshkumaran
In smart grid, advanced metering infrastructure (AMI) is an important task for predicting the power consumption such that the balance of supply and demand in power market can be achieved. For designing a good communication infrastructure for the smart meters, it is necessary to study the short term power consumption pattern which is equivalent to the information source pattern in communication systems. To design a system to reduce the power consumption for individual users in scheduled duration Instead of power cuts there will be a scheduled restricted power supply. We implement GSM based remote controlling station from where we send control information consist maximum power consumption and restriction period. If the consumers uses more power than the allowed power, after a warning the system will shut down the power supply automatically.
{"title":"Design of automatic power consumption control system using smart grid — A review","authors":"P. Sakthivel, S. Ganeshkumaran","doi":"10.1109/STARTUP.2016.7583951","DOIUrl":"https://doi.org/10.1109/STARTUP.2016.7583951","url":null,"abstract":"In smart grid, advanced metering infrastructure (AMI) is an important task for predicting the power consumption such that the balance of supply and demand in power market can be achieved. For designing a good communication infrastructure for the smart meters, it is necessary to study the short term power consumption pattern which is equivalent to the information source pattern in communication systems. To design a system to reduce the power consumption for individual users in scheduled duration Instead of power cuts there will be a scheduled restricted power supply. We implement GSM based remote controlling station from where we send control information consist maximum power consumption and restriction period. If the consumers uses more power than the allowed power, after a warning the system will shut down the power supply automatically.","PeriodicalId":355852,"journal":{"name":"2016 World Conference on Futuristic Trends in Research and Innovation for Social Welfare (Startup Conclave)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132580750","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-02-01DOI: 10.1109/STARTUP.2016.7583968
Tushar M. Chaure, Kavita R. Singh
Frequent Itemset Mining is one of the most popular techniques to extract knowledge from data. However, these mining methods become more problematic when they are applied to Big Data. Fortunately, recent improvements in the field of parallel programming provide many tools to tackle this problem. However, these tools come with their own technical challenges such as balanced data distribution and inter-communication costs. In this paper, we are presenting a detailed survey of Hadoop, which helps in storing data and parallel processing in distributed environment. Here we have explored various Frequent Itemset Mining techniques on parallel and distributed environment. The aim of this paper is to present a comparison of different frequent itemset mining techniques and help to develop efficient and scalable frequent itemset mining techniques.
{"title":"Frequent Itemset Mining techniques — A technical review","authors":"Tushar M. Chaure, Kavita R. Singh","doi":"10.1109/STARTUP.2016.7583968","DOIUrl":"https://doi.org/10.1109/STARTUP.2016.7583968","url":null,"abstract":"Frequent Itemset Mining is one of the most popular techniques to extract knowledge from data. However, these mining methods become more problematic when they are applied to Big Data. Fortunately, recent improvements in the field of parallel programming provide many tools to tackle this problem. However, these tools come with their own technical challenges such as balanced data distribution and inter-communication costs. In this paper, we are presenting a detailed survey of Hadoop, which helps in storing data and parallel processing in distributed environment. Here we have explored various Frequent Itemset Mining techniques on parallel and distributed environment. The aim of this paper is to present a comparison of different frequent itemset mining techniques and help to develop efficient and scalable frequent itemset mining techniques.","PeriodicalId":355852,"journal":{"name":"2016 World Conference on Futuristic Trends in Research and Innovation for Social Welfare (Startup Conclave)","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129346898","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-02-01DOI: 10.1109/STARTUP.2016.7583952
Anuja Lawankar, Nikhil Mangrulkar
Now a days Internet is widely used by users to satisfy their information needs. In the exponential growth of web, searching for useful information has become more difficult. Web crawler helps to extract the relevant and irrelevant links from the web. To optimizing this irrelevant links various algorithms and technique are used. Discovering information by using web crawler have certain issues; such as different URLs having the similar text which increase the time complexity of the search, crawler resources are wasted in fetching duplicate pages and larger storage is also required to store these web pages. These are some of the roadblocks in getting optimum results from the crawler. This paper provides a deep study of existing information retrieval techniques (I.R) which would help researchers to retrieve optimum result links and information.
{"title":"A review on techniques for optimizing web crawler results","authors":"Anuja Lawankar, Nikhil Mangrulkar","doi":"10.1109/STARTUP.2016.7583952","DOIUrl":"https://doi.org/10.1109/STARTUP.2016.7583952","url":null,"abstract":"Now a days Internet is widely used by users to satisfy their information needs. In the exponential growth of web, searching for useful information has become more difficult. Web crawler helps to extract the relevant and irrelevant links from the web. To optimizing this irrelevant links various algorithms and technique are used. Discovering information by using web crawler have certain issues; such as different URLs having the similar text which increase the time complexity of the search, crawler resources are wasted in fetching duplicate pages and larger storage is also required to store these web pages. These are some of the roadblocks in getting optimum results from the crawler. This paper provides a deep study of existing information retrieval techniques (I.R) which would help researchers to retrieve optimum result links and information.","PeriodicalId":355852,"journal":{"name":"2016 World Conference on Futuristic Trends in Research and Innovation for Social Welfare (Startup Conclave)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121905340","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-02-01DOI: 10.1109/STARTUP.2016.7583936
J. Nithya, P. Latha
Wireless network is a type of computer networks where communication or data exchange among various devices on the network are carried out without the use of cables. Connecting clients is through a wireless network having a wireless Access Point (AP) instead of an Ethernet switch. Recent advancements in Wireless Energy Transfer (WET) technologies are enabling various engineering applications with potential implementation. RF-enabled WET provide a solution called Wireless Powered Communication (WPC). WPC technique is used to power the wireless devices by transmitter to offer uninterrupted, constant energy. WET technology can be utilized to charge the batteries in the equipment without the need for a wired connection. In WET technology, receivers harvest power distantly from RF signals. The receiver change the received energy to Direct Current signal and stores into battery. In SWIPT technology, both energy and information equally transmits to the multiple receivers by using Hybrid Access Point(HAP). HAP include a energy trade off method together in source, destination designs to equilibrium the Information Decoding and Energy Collecting presentation. In WPCN technology, all wireless devices transmits the information and communicates with each other by using the harvested energy. It operates beneath a two process collect then transmit protocol.
{"title":"Energy harvest and transfer technology in wireless networks","authors":"J. Nithya, P. Latha","doi":"10.1109/STARTUP.2016.7583936","DOIUrl":"https://doi.org/10.1109/STARTUP.2016.7583936","url":null,"abstract":"Wireless network is a type of computer networks where communication or data exchange among various devices on the network are carried out without the use of cables. Connecting clients is through a wireless network having a wireless Access Point (AP) instead of an Ethernet switch. Recent advancements in Wireless Energy Transfer (WET) technologies are enabling various engineering applications with potential implementation. RF-enabled WET provide a solution called Wireless Powered Communication (WPC). WPC technique is used to power the wireless devices by transmitter to offer uninterrupted, constant energy. WET technology can be utilized to charge the batteries in the equipment without the need for a wired connection. In WET technology, receivers harvest power distantly from RF signals. The receiver change the received energy to Direct Current signal and stores into battery. In SWIPT technology, both energy and information equally transmits to the multiple receivers by using Hybrid Access Point(HAP). HAP include a energy trade off method together in source, destination designs to equilibrium the Information Decoding and Energy Collecting presentation. In WPCN technology, all wireless devices transmits the information and communicates with each other by using the harvested energy. It operates beneath a two process collect then transmit protocol.","PeriodicalId":355852,"journal":{"name":"2016 World Conference on Futuristic Trends in Research and Innovation for Social Welfare (Startup Conclave)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124736740","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-02-01DOI: 10.1109/STARTUP.2016.7583960
P. Ganesan, B. Sathish, G. Sajiv
In this paper, a novel method for the segmentation and extraction of natural fruits using Hill climbing (HC) optimization and Modified Fuzzy C-Means (MFCM) clustering algorithm is proposed. The intensity and color information is highly correlated in RGB color images. The segmentation in RGB color space does not produce the meaningful outcome for the segmentation and information retrieval. Many authors have proposed different color space for the segmentation and retrieval of information. In this color based segmentation technique, RGB color images had transformed into perceptually uniform, device independent CIELuv color space for the efficient segmentation. Then for the CIELuv image, the color histogram had generated and computed. This color histogram acts as a search space and has a number of bins. In this work, Hill climbing (HC) optimization had applied for the identification of best image pixels (peaks) which correspond to the initial number of seeds or clusters for the segmentation process. These initial seeds had applied to MFCM for the segmentation of fruits in CIELuv color images. The experimental result had compared with the segmentation process in RGB color space to demonstrate the efficiency of the proposed approach.
{"title":"Automatic segmentation of fruits in CIELuv color space image using hill climbing optimization and fuzzy C-Means clustering","authors":"P. Ganesan, B. Sathish, G. Sajiv","doi":"10.1109/STARTUP.2016.7583960","DOIUrl":"https://doi.org/10.1109/STARTUP.2016.7583960","url":null,"abstract":"In this paper, a novel method for the segmentation and extraction of natural fruits using Hill climbing (HC) optimization and Modified Fuzzy C-Means (MFCM) clustering algorithm is proposed. The intensity and color information is highly correlated in RGB color images. The segmentation in RGB color space does not produce the meaningful outcome for the segmentation and information retrieval. Many authors have proposed different color space for the segmentation and retrieval of information. In this color based segmentation technique, RGB color images had transformed into perceptually uniform, device independent CIELuv color space for the efficient segmentation. Then for the CIELuv image, the color histogram had generated and computed. This color histogram acts as a search space and has a number of bins. In this work, Hill climbing (HC) optimization had applied for the identification of best image pixels (peaks) which correspond to the initial number of seeds or clusters for the segmentation process. These initial seeds had applied to MFCM for the segmentation of fruits in CIELuv color images. The experimental result had compared with the segmentation process in RGB color space to demonstrate the efficiency of the proposed approach.","PeriodicalId":355852,"journal":{"name":"2016 World Conference on Futuristic Trends in Research and Innovation for Social Welfare (Startup Conclave)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121084619","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-02-01DOI: 10.1109/STARTUP.2016.7583985
Ashwini S. Khadatkar, R. Khedgaonkar, K. S. Patnaik
Face recognition has acquired a lot of attention in market and research communities, but still remained very accosting in real time applications. It is one of the several techniques used for identifying an individual. In face recognition system there are many factors which affect the performance of a system. The major factors affecting the face recognition system are pose, illumination, ageing, occlusion and expression etc. Among the above mentioned problem an occlusion is most affecting problem in face recognition. In a face recognition system due to obstacles like sunglasses, scarf etc. we cannot recognize a face image. So first we detect an occlusion from a face image by using a SVM (Support Vector Machine) classifier. To resolve the occlusion problem, each face is divided into k local regions which are analyzed in isolation. We discard an occluded part in a face image and based on remaining non-occluded part of a face image we will recognize a face image. For face recognition purpose we will be using a near set theory.
{"title":"Occlusion invariant face recognition system","authors":"Ashwini S. Khadatkar, R. Khedgaonkar, K. S. Patnaik","doi":"10.1109/STARTUP.2016.7583985","DOIUrl":"https://doi.org/10.1109/STARTUP.2016.7583985","url":null,"abstract":"Face recognition has acquired a lot of attention in market and research communities, but still remained very accosting in real time applications. It is one of the several techniques used for identifying an individual. In face recognition system there are many factors which affect the performance of a system. The major factors affecting the face recognition system are pose, illumination, ageing, occlusion and expression etc. Among the above mentioned problem an occlusion is most affecting problem in face recognition. In a face recognition system due to obstacles like sunglasses, scarf etc. we cannot recognize a face image. So first we detect an occlusion from a face image by using a SVM (Support Vector Machine) classifier. To resolve the occlusion problem, each face is divided into k local regions which are analyzed in isolation. We discard an occluded part in a face image and based on remaining non-occluded part of a face image we will recognize a face image. For face recognition purpose we will be using a near set theory.","PeriodicalId":355852,"journal":{"name":"2016 World Conference on Futuristic Trends in Research and Innovation for Social Welfare (Startup Conclave)","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124400392","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-02-01DOI: 10.1109/STARTUP.2016.7583943
Mayur P. Satpute, S. Khade
In this paper, a tri band compact octagonal fractal monopole MIMO antenna is presented. The proposed antenna is microstrip line fed and its structure is based on fractal geometry where the resonance frequency of antenna is lowered by applying iteration techniques. The simulated bandwidth of the antenna are 2.3706GHz to 2.45GHz, 3.398GHz to 3.677GHz and 4.9352GHz to 5.8988GHz (S11 <; -10 dB), covering the bands of WLAN and WiMAX. The characteristics of small size, nearly omnidirectional radiation pattern and moderate gain make the proposed MIMO antenna entirely applicable to WLAN and WiMAX applications. The proposed antenna has compact size of 50 mm × 50 mm. Details of the proposed antenna design and performance are presented and discussed.
{"title":"A novel shape octagonal koch fractal MIMO antenna for WLAN and WiMAX application","authors":"Mayur P. Satpute, S. Khade","doi":"10.1109/STARTUP.2016.7583943","DOIUrl":"https://doi.org/10.1109/STARTUP.2016.7583943","url":null,"abstract":"In this paper, a tri band compact octagonal fractal monopole MIMO antenna is presented. The proposed antenna is microstrip line fed and its structure is based on fractal geometry where the resonance frequency of antenna is lowered by applying iteration techniques. The simulated bandwidth of the antenna are 2.3706GHz to 2.45GHz, 3.398GHz to 3.677GHz and 4.9352GHz to 5.8988GHz (S11 <; -10 dB), covering the bands of WLAN and WiMAX. The characteristics of small size, nearly omnidirectional radiation pattern and moderate gain make the proposed MIMO antenna entirely applicable to WLAN and WiMAX applications. The proposed antenna has compact size of 50 mm × 50 mm. Details of the proposed antenna design and performance are presented and discussed.","PeriodicalId":355852,"journal":{"name":"2016 World Conference on Futuristic Trends in Research and Innovation for Social Welfare (Startup Conclave)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131054841","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}