首页 > 最新文献

2017 7th International Conference on Communication Systems and Network Technologies (CSNT)最新文献

英文 中文
Performance analysis of cloud applications using cloud analyst 使用云分析工具对云应用程序进行性能分析
A. Dubey, Vimal Mishra
Advancements in the cloud computing is initiating the new opportunities for cloud applications. Now people, devices and networks are constantly generating huge data. There exist several tools that can be used to model such environment and to study the behavior of large scale applications or services. Cloud Analyst is the one of the best visual modeler and analyzing tool for cloud environment. The Cloud Analyst tool is having global visualization modeling capability. In this tool, we can model geographically distributed computing servers and user workloads. It provides easy to use visual tool so that a modeler can fully concentrate on the simulation parameters rather than the complexities of programming. In this paper, we review the feature and simulation screens of Cloud Analyst and analytical study of different simulation configuration setup. We have explored various simulation scenarios and analyze the result of different scenarios.
云计算的进步为云应用程序带来了新的机遇。现在,人、设备和网络不断产生巨大的数据。有几种工具可用于对这种环境进行建模,并研究大规模应用程序或服务的行为。Cloud Analyst是云环境中最好的可视化建模和分析工具之一。Cloud Analyst工具具有全局可视化建模功能。在这个工具中,我们可以对地理上分布的计算服务器和用户工作负载进行建模。它提供了易于使用的可视化工具,以便建模者可以完全专注于仿真参数,而不是编程的复杂性。本文回顾了Cloud Analyst的特性和仿真界面,并对不同的仿真配置设置进行了分析研究。我们探索了各种模拟场景,并分析了不同场景的结果。
{"title":"Performance analysis of cloud applications using cloud analyst","authors":"A. Dubey, Vimal Mishra","doi":"10.1109/CSNT.2017.8418515","DOIUrl":"https://doi.org/10.1109/CSNT.2017.8418515","url":null,"abstract":"Advancements in the cloud computing is initiating the new opportunities for cloud applications. Now people, devices and networks are constantly generating huge data. There exist several tools that can be used to model such environment and to study the behavior of large scale applications or services. Cloud Analyst is the one of the best visual modeler and analyzing tool for cloud environment. The Cloud Analyst tool is having global visualization modeling capability. In this tool, we can model geographically distributed computing servers and user workloads. It provides easy to use visual tool so that a modeler can fully concentrate on the simulation parameters rather than the complexities of programming. In this paper, we review the feature and simulation screens of Cloud Analyst and analytical study of different simulation configuration setup. We have explored various simulation scenarios and analyze the result of different scenarios.","PeriodicalId":382417,"journal":{"name":"2017 7th International Conference on Communication Systems and Network Technologies (CSNT)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116948741","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
The design and implementation of the front end of the art play library system 美术游戏库系统前端的设计与实现
N. Yi, Xin Feng, Chunfang Li
With the continuous enrichment of film and television, the script management system came into being. At the same time, the arrival of the Web2.0 era has made people become stricter about the usability and interactive experience of the website. Well designed and well featured web sites can increase user experience and increase user retention, while poorly designed and slow acting sites make users feel bad and churn out a large number of users. Therefore, the front-end design and interaction of web applications is becoming more important. The first chapter introduces the background and significance of the development of art play library system, the second chapter introduces the three basic front-end technologies and the common framework, the third chapter introduces the overall structure of the system and the specific design and implementation of front end, the fourth chapter summarizes.
随着影视的不断丰富,剧本管理系统应运而生。同时,Web2.0时代的到来,让人们对网站的可用性和交互体验变得更加严格。设计良好、功能完善的网站可以增加用户体验,提高用户留存率,而设计糟糕、运行缓慢的网站会让用户感觉糟糕,并流失大量用户。因此,web应用程序的前端设计和交互变得越来越重要。第一章介绍了艺玩图书馆系统开发的背景和意义,第二章介绍了三种基本的前端技术和常用框架,第三章介绍了系统的总体结构和前端的具体设计与实现,第四章总结。
{"title":"The design and implementation of the front end of the art play library system","authors":"N. Yi, Xin Feng, Chunfang Li","doi":"10.1109/CSNT.2017.8418553","DOIUrl":"https://doi.org/10.1109/CSNT.2017.8418553","url":null,"abstract":"With the continuous enrichment of film and television, the script management system came into being. At the same time, the arrival of the Web2.0 era has made people become stricter about the usability and interactive experience of the website. Well designed and well featured web sites can increase user experience and increase user retention, while poorly designed and slow acting sites make users feel bad and churn out a large number of users. Therefore, the front-end design and interaction of web applications is becoming more important. The first chapter introduces the background and significance of the development of art play library system, the second chapter introduces the three basic front-end technologies and the common framework, the third chapter introduces the overall structure of the system and the specific design and implementation of front end, the fourth chapter summarizes.","PeriodicalId":382417,"journal":{"name":"2017 7th International Conference on Communication Systems and Network Technologies (CSNT)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126262054","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Study of smart home communication protocol's and security & privacy aspects 智能家居通信协议和安全隐私方面的研究
A. K. Ray, A. Bagwari
The IoT (Internet-of-Things) make possible the physical things or home appliances or hand held devices or objects (e.g., smart phones, TVs, cars) can be interconnected by means of suitable communication protocols and information technology infrastructure to share the data to each other and access a range of applications and services like data storage, analytics. In current scenario, application of IoT & its supporting tools and techniques in smart home implementation is one of the major area where many big companies like Google, Amazon etc are investing huge amount of money and initiated the research for better comfort security & safety at home. This paper will discuss about smart homes and its components, application of Internet of Things in smart homes, communication protocol details applicable for smart home devices communication, security flaws in existing protocols of communication for IoT enabled hardware and proposed secure protocol with desirable attributes for secure communication protocol for smart homes using IoT and it can interoperate and compatible with existing protocols.
物联网(Internet-of-Things)使物理设备或家用电器或手持设备或对象(例如,智能手机,电视,汽车)可以通过适当的通信协议和信息技术基础设施相互连接,以相互共享数据并访问一系列应用程序和服务,如数据存储,分析。在目前的情况下,物联网及其支持工具和技术在智能家居实施中的应用是许多大公司(如谷歌,亚马逊等)投入大量资金并开始研究更好的舒适安全和家庭安全的主要领域之一。本文将讨论智能家居及其组件,物联网在智能家居中的应用,适用于智能家居设备通信的通信协议细节,支持物联网硬件的现有通信协议的安全缺陷,并提出具有理想属性的安全协议,用于使用物联网的智能家居的安全通信协议,它可以与现有协议互操作和兼容。
{"title":"Study of smart home communication protocol's and security & privacy aspects","authors":"A. K. Ray, A. Bagwari","doi":"10.1109/CSNT.2017.8418545","DOIUrl":"https://doi.org/10.1109/CSNT.2017.8418545","url":null,"abstract":"The IoT (Internet-of-Things) make possible the physical things or home appliances or hand held devices or objects (e.g., smart phones, TVs, cars) can be interconnected by means of suitable communication protocols and information technology infrastructure to share the data to each other and access a range of applications and services like data storage, analytics. In current scenario, application of IoT & its supporting tools and techniques in smart home implementation is one of the major area where many big companies like Google, Amazon etc are investing huge amount of money and initiated the research for better comfort security & safety at home. This paper will discuss about smart homes and its components, application of Internet of Things in smart homes, communication protocol details applicable for smart home devices communication, security flaws in existing protocols of communication for IoT enabled hardware and proposed secure protocol with desirable attributes for secure communication protocol for smart homes using IoT and it can interoperate and compatible with existing protocols.","PeriodicalId":382417,"journal":{"name":"2017 7th International Conference on Communication Systems and Network Technologies (CSNT)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124419313","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
An LMI approach for robust LQR control of PWM buck converter with parasitics 带有寄生的PWM降压变换器鲁棒LQR控制的LMI方法
Deepali Doliya, M. Bhandari
In this paper, a polytopic model of an uncertain buck converter with parasitic resistances is obtained in continuous conduction mode. Although linear quadratic regulators (LQRs) provide good stability and are optimal but they do not ensure robustness for the highly uncertain system. Therefore, A robust LQR designing method for power converters is presented using linear matrix inequalities (LMIs) to ensure robust stability of highly uncertain systems and the output is analyzed in the presence of line and load perturbations. In addition, an input voltage feedforward gain is included in this closed loop converter system to achieve a good line regulation. It is shown that with feedforward, there is no transient due to the line voltage perturbations. The results of the proposed approach are verified through simulation.
本文建立了具有寄生电阻的不确定降压变换器在连续导通模式下的多面体模型。线性二次型调节器(LQRs)具有较好的稳定性和最优性,但对于高度不确定的系统,其鲁棒性不能保证。为此,提出了一种基于线性矩阵不等式的电力变换器鲁棒LQR设计方法,以保证高度不确定系统的鲁棒稳定性,并分析了存在线路和负载扰动时的输出。此外,在闭环变换器系统中加入了输入电压前馈增益,实现了良好的线路调节。结果表明,采用前馈系统时,不存在线电压扰动引起的暂态。仿真结果验证了该方法的有效性。
{"title":"An LMI approach for robust LQR control of PWM buck converter with parasitics","authors":"Deepali Doliya, M. Bhandari","doi":"10.1109/CSNT.2017.8418519","DOIUrl":"https://doi.org/10.1109/CSNT.2017.8418519","url":null,"abstract":"In this paper, a polytopic model of an uncertain buck converter with parasitic resistances is obtained in continuous conduction mode. Although linear quadratic regulators (LQRs) provide good stability and are optimal but they do not ensure robustness for the highly uncertain system. Therefore, A robust LQR designing method for power converters is presented using linear matrix inequalities (LMIs) to ensure robust stability of highly uncertain systems and the output is analyzed in the presence of line and load perturbations. In addition, an input voltage feedforward gain is included in this closed loop converter system to achieve a good line regulation. It is shown that with feedforward, there is no transient due to the line voltage perturbations. The results of the proposed approach are verified through simulation.","PeriodicalId":382417,"journal":{"name":"2017 7th International Conference on Communication Systems and Network Technologies (CSNT)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125824588","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Design and implementation of an efficient tool to verify integrity of files uploaded to cloud storage 设计和实现一个有效的工具来验证上传到云存储的文件的完整性
Priyansi Parida, Snehalata Konhar, Bharati Mishra, Debsish Jena
Cloud storage system (CSS) provides storage service through which users can upload their files for getting several benefits like ease of access, less cost and robustness. The uploaded files must be encrypted to achieve confidentiality. These files are replicated across multiple nodes distributed over various geographical boundaries by the CSS provider to ensure robust-ness. But these files may get corrupted unintentionally during transmission or intentionally by malicious users. To ensure the integrity of the uploaded file, an efficient integrity verifier tool is essential. In this paper, the design and implementation of an integrity verifier tool for files uploaded to cloud has been presented. Merkle Hash Tree (MHT) and digital signatures have been used to verify the integrity. The tool has been integrated with Dropbox Cloud Storage Provider and its performance results have been presented.
云存储系统(CSS)提供存储服务,用户可以通过该服务上传文件,从而获得易于访问、成本较低和健壮性等优点。上传的文件必须加密,以达到机密性。CSS提供程序跨分布在不同地理边界上的多个节点复制这些文件,以确保健壮性。但这些文件可能会在传输过程中无意中或被恶意用户故意损坏。为了确保上传文件的完整性,一个有效的完整性验证工具是必不可少的。本文介绍了一种上传至云端文件的完整性验证工具的设计与实现。使用了默克尔哈希树(MHT)和数字签名来验证完整性。该工具已与Dropbox云存储提供商集成,其性能结果已呈现。
{"title":"Design and implementation of an efficient tool to verify integrity of files uploaded to cloud storage","authors":"Priyansi Parida, Snehalata Konhar, Bharati Mishra, Debsish Jena","doi":"10.1109/CSNT.2017.8418512","DOIUrl":"https://doi.org/10.1109/CSNT.2017.8418512","url":null,"abstract":"Cloud storage system (CSS) provides storage service through which users can upload their files for getting several benefits like ease of access, less cost and robustness. The uploaded files must be encrypted to achieve confidentiality. These files are replicated across multiple nodes distributed over various geographical boundaries by the CSS provider to ensure robust-ness. But these files may get corrupted unintentionally during transmission or intentionally by malicious users. To ensure the integrity of the uploaded file, an efficient integrity verifier tool is essential. In this paper, the design and implementation of an integrity verifier tool for files uploaded to cloud has been presented. Merkle Hash Tree (MHT) and digital signatures have been used to verify the integrity. The tool has been integrated with Dropbox Cloud Storage Provider and its performance results have been presented.","PeriodicalId":382417,"journal":{"name":"2017 7th International Conference on Communication Systems and Network Technologies (CSNT)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130486780","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Detection of attacks in IoT based on ontology using SPARQL 基于SPARQL本体的物联网攻击检测
Mohit Mittal, Shafalika Vijayal
Nowadays, the concept of Internet of Things (IoT) has been manifested into reality with the help of latest developments or transformations in hardware circuitry, devices and protocols. IoT is such a diversified field in which a lot of challenges are faced during implementations of IoT applications including smart cities, smart homes, industrial sectors etc. The current scenario is highly demanding for deployment of smart sensors into existing applications to deliver a fully automated system. The major issue faced by IoT's existing system is security issue. In this paper, various attacks in IoT systems has discussed and focuses on ontology based model to deal with various attacks.
如今,借助硬件电路、设备和协议的最新发展或转变,物联网(IoT)的概念已经体现为现实。物联网是一个多元化的领域,在物联网应用的实施过程中面临着许多挑战,包括智能城市,智能家居,工业部门等。当前的场景要求将智能传感器部署到现有的应用程序中,以提供完全自动化的系统。物联网现有系统面临的主要问题是安全问题。本文对物联网系统中的各种攻击进行了讨论,重点讨论了基于本体的模型来应对各种攻击。
{"title":"Detection of attacks in IoT based on ontology using SPARQL","authors":"Mohit Mittal, Shafalika Vijayal","doi":"10.1109/CSNT.2017.8418538","DOIUrl":"https://doi.org/10.1109/CSNT.2017.8418538","url":null,"abstract":"Nowadays, the concept of Internet of Things (IoT) has been manifested into reality with the help of latest developments or transformations in hardware circuitry, devices and protocols. IoT is such a diversified field in which a lot of challenges are faced during implementations of IoT applications including smart cities, smart homes, industrial sectors etc. The current scenario is highly demanding for deployment of smart sensors into existing applications to deliver a fully automated system. The major issue faced by IoT's existing system is security issue. In this paper, various attacks in IoT systems has discussed and focuses on ontology based model to deal with various attacks.","PeriodicalId":382417,"journal":{"name":"2017 7th International Conference on Communication Systems and Network Technologies (CSNT)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127904750","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
A multilevel encryption technique in cloud security 云安全中的多级加密技术
Bappaditya Jana, Jayanta Poray, Tamoghna Mandal, Malay Kule
Today ensuring security is one of the major concern in cloud environment. Cloud privacy is a one of the tentative issue in cloud computing. As the entire cloud user do not have same demands regarding cloud privacy. Some of the clients are satisfied with current policy where as others are quite concerned about the corresponding privacy. As per the fundamental cloud architecture it is generally deployed via three core service models, namely software as a service, platform as service and infrastructure as a service. But unfortunately these entire delivery services model are vulnerable to a range of security attacks by intelligent intruder. Although government as well as major of the organizations are moving fast towards a secure cloud cryptography offers a wide range of algorithms for cloud security but all these algorithms provide single level encryption. To enhance the security level we have proposed a multilevel security scheme which is more secure than any type of single level encryption. Particularly our technique shows that only authorized user can able to access the cloud data. Our algorithm is fast and safe in both direction such as upload and download of a file. As decryption technique is multilevel so if some data is lost then it is very difficult to decrypt the data.
如今,确保安全性是云环境中的主要关注点之一。云隐私是云计算中的一个尝试性问题。由于整个云用户对云隐私的需求不尽相同。一些客户对目前的政策感到满意,而另一些客户则非常关注相应的隐私。根据基本的云架构,它通常通过三种核心服务模型进行部署,即软件即服务、平台即服务和基础设施即服务。但不幸的是,这些整个交付服务模型容易受到智能入侵者的一系列安全攻击。尽管政府和大多数组织都在快速向安全的云移动,加密技术为云安全提供了广泛的算法,但所有这些算法都提供了单一级别的加密。为了提高安全级别,我们提出了一个比任何类型的单级加密更安全的多级安全方案。特别是我们的技术表明,只有授权用户才能访问云数据。我们的算法在上传和下载文件的两个方向上都是快速和安全的。由于解密技术是多层次的,因此如果数据丢失,那么解密数据是非常困难的。
{"title":"A multilevel encryption technique in cloud security","authors":"Bappaditya Jana, Jayanta Poray, Tamoghna Mandal, Malay Kule","doi":"10.1109/CSNT.2017.8418541","DOIUrl":"https://doi.org/10.1109/CSNT.2017.8418541","url":null,"abstract":"Today ensuring security is one of the major concern in cloud environment. Cloud privacy is a one of the tentative issue in cloud computing. As the entire cloud user do not have same demands regarding cloud privacy. Some of the clients are satisfied with current policy where as others are quite concerned about the corresponding privacy. As per the fundamental cloud architecture it is generally deployed via three core service models, namely software as a service, platform as service and infrastructure as a service. But unfortunately these entire delivery services model are vulnerable to a range of security attacks by intelligent intruder. Although government as well as major of the organizations are moving fast towards a secure cloud cryptography offers a wide range of algorithms for cloud security but all these algorithms provide single level encryption. To enhance the security level we have proposed a multilevel security scheme which is more secure than any type of single level encryption. Particularly our technique shows that only authorized user can able to access the cloud data. Our algorithm is fast and safe in both direction such as upload and download of a file. As decryption technique is multilevel so if some data is lost then it is very difficult to decrypt the data.","PeriodicalId":382417,"journal":{"name":"2017 7th International Conference on Communication Systems and Network Technologies (CSNT)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123228260","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Smart input: Provide mouse and keyboard input to a PC from android devices 智能输入:从android设备向PC提供鼠标和键盘输入
Abhisek Maiti, Sayantan Majumdar, S. Bhattacharjee, A. Nath
Most Android smartphones have numerous built-in sensors. These sensors are capable of providing raw data with high precision and accuracy. However, the applicability of these sensors is not limited to the host device. This paper focuses on the application of inertial sensors (Accelerometer and Gyroscope) to monitor three-dimensional device movement and orientation and emulate the mobile device as a virtual multi-purpose input device by making appropriate use of these data in realtime. Predictive text and auto-correct are useful features of smartphones that traditional PCs generally do not offer. The paper also focuses on incorporating these features while emulating the mobile device as a text input device capable of inputting together a sequence of characters. Strong end to end encryption is enforced on these data for obvious security reasons.
大多数安卓智能手机都有许多内置传感器。这些传感器能够提供高精度和准确度的原始数据。然而,这些传感器的适用性并不局限于主机设备。本文的重点是利用惯性传感器(加速度计和陀螺仪)实时监测三维设备的运动和方向,并适当利用这些数据将移动设备模拟为虚拟的多用途输入设备。预测文本和自动纠错是智能手机的有用功能,而传统个人电脑通常不具备这些功能。本文还侧重于将这些功能结合起来,同时模拟移动设备作为能够输入一系列字符的文本输入设备。出于明显的安全原因,对这些数据实施了强端到端加密。
{"title":"Smart input: Provide mouse and keyboard input to a PC from android devices","authors":"Abhisek Maiti, Sayantan Majumdar, S. Bhattacharjee, A. Nath","doi":"10.1109/CSNT.2017.8418558","DOIUrl":"https://doi.org/10.1109/CSNT.2017.8418558","url":null,"abstract":"Most Android smartphones have numerous built-in sensors. These sensors are capable of providing raw data with high precision and accuracy. However, the applicability of these sensors is not limited to the host device. This paper focuses on the application of inertial sensors (Accelerometer and Gyroscope) to monitor three-dimensional device movement and orientation and emulate the mobile device as a virtual multi-purpose input device by making appropriate use of these data in realtime. Predictive text and auto-correct are useful features of smartphones that traditional PCs generally do not offer. The paper also focuses on incorporating these features while emulating the mobile device as a text input device capable of inputting together a sequence of characters. Strong end to end encryption is enforced on these data for obvious security reasons.","PeriodicalId":382417,"journal":{"name":"2017 7th International Conference on Communication Systems and Network Technologies (CSNT)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114030896","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Analysis and synthesis of two step coupled gap resonator and its application as a bandpass filter 两阶耦合间隙谐振器的分析与合成及其作为带通滤波器的应用
P. Mondal, S. K. Parui
In this manuscript, a two step gap coupled resonator is modelled for designing a bandpass filter. The proposed structure is viewed simultaneously as edge coupled section and parallel coupled section. A detailed nodal analysis of the proposed coupled gap sections using different current and voltage equations are described, which is further derived to obtain different admittance parameter equations. Finally comparing those equations with normal two port network, even and odd mode impedance difference (Z0o-Z0e) equations are obtained in terms of parallel coupled admittance inverter (Jg1) and shunt susceptance (Bg1) at the edge coupled section. This equation is further used for designing the resonator with bandaccepted characteristics. A three pole wideband bandpass filter is demonstrated by series arrangement of four such coupled resonator unit. The proposed bandpass filter exhibits FBW of 53.5%. All the results are well verified by numerical simulation and validated through experiments.
本文建立了用于设计带通滤波器的两阶间隙耦合谐振器的模型。所提出的结构可同时视为边缘耦合截面和平行耦合截面。采用不同的电流和电压方程对所提出的耦合间隙截面进行了详细的节点分析,并进一步推导出不同的导纳参数方程。最后将这些方程与正常的双端口网络进行比较,得到了沿耦合段并联耦合导纳逆变器(Jg1)和并联电纳(Bg1)的偶模和奇模阻抗差(z0 - z0e)方程。该方程进一步用于设计具有带接受特性的谐振器。通过四个耦合谐振器单元的串联布置,演示了一种三极宽带带通滤波器。该带通滤波器的FBW为53.5%。数值模拟和实验结果均得到了很好的验证。
{"title":"Analysis and synthesis of two step coupled gap resonator and its application as a bandpass filter","authors":"P. Mondal, S. K. Parui","doi":"10.1109/CSNT.2017.8418501","DOIUrl":"https://doi.org/10.1109/CSNT.2017.8418501","url":null,"abstract":"In this manuscript, a two step gap coupled resonator is modelled for designing a bandpass filter. The proposed structure is viewed simultaneously as edge coupled section and parallel coupled section. A detailed nodal analysis of the proposed coupled gap sections using different current and voltage equations are described, which is further derived to obtain different admittance parameter equations. Finally comparing those equations with normal two port network, even and odd mode impedance difference (Z0o-Z0e) equations are obtained in terms of parallel coupled admittance inverter (Jg1) and shunt susceptance (Bg1) at the edge coupled section. This equation is further used for designing the resonator with bandaccepted characteristics. A three pole wideband bandpass filter is demonstrated by series arrangement of four such coupled resonator unit. The proposed bandpass filter exhibits FBW of 53.5%. All the results are well verified by numerical simulation and validated through experiments.","PeriodicalId":382417,"journal":{"name":"2017 7th International Conference on Communication Systems and Network Technologies (CSNT)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122808899","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A compact wideband staircase-shaped four-element MIMO antenna for WLAN, L-band and S-band applications 一种紧凑型宽带阶梯状四元MIMO天线,适用于WLAN, l波段和s波段应用
Aastha Gupta, Vipin Choudhary, M. Tripathy, P. Ranjan
In this paper, a compact quad-port four-element multiple input multiple output (MIMO) antenna operating at 2.4 GHz is reported. The frequency bandwidth is obtained as 1.1–5.3 GHz and is suitable for WLAN/WiMAX and IoT applications. The overall dimension of the substrate is 30×70×1.6 mm3. The area covered by antenna elements and the coplanar ground plane are 30×20 mm2 and 30×50 mm2 respectively. To reduce mutual coupling between the elements and achieve good isolation, parasitic element is used at the back of the antenna. The maximum isolation obtained is −20 dB at 2GHz. The peak gain is obtained as 4.1 dB at operating frequency 2.4 GHz. The proposed compact and planar four element MIMO antenna is designed and simulated by using HFSS 14.
本文报道了一种工作频率为2.4 GHz的紧凑型四端口四元多输入多输出(MIMO)天线。得到的频率带宽为1.1 ~ 5.3 GHz,适用于WLAN/WiMAX和IoT应用。基板的整体尺寸为30×70×1.6 mm3。天线单元覆盖面积为30×20 mm2,共面接平面面积为30×50 mm2。为了减少元件之间的相互耦合,达到良好的隔离效果,在天线的背面采用了寄生元件。在2GHz时获得的最大隔离度为- 20 dB。工作频率为2.4 GHz时,峰值增益为4.1 dB。采用hfss14对所提出的紧凑平面四元MIMO天线进行了设计和仿真。
{"title":"A compact wideband staircase-shaped four-element MIMO antenna for WLAN, L-band and S-band applications","authors":"Aastha Gupta, Vipin Choudhary, M. Tripathy, P. Ranjan","doi":"10.1109/CSNT.2017.8418503","DOIUrl":"https://doi.org/10.1109/CSNT.2017.8418503","url":null,"abstract":"In this paper, a compact quad-port four-element multiple input multiple output (MIMO) antenna operating at 2.4 GHz is reported. The frequency bandwidth is obtained as 1.1–5.3 GHz and is suitable for WLAN/WiMAX and IoT applications. The overall dimension of the substrate is 30×70×1.6 mm3. The area covered by antenna elements and the coplanar ground plane are 30×20 mm2 and 30×50 mm2 respectively. To reduce mutual coupling between the elements and achieve good isolation, parasitic element is used at the back of the antenna. The maximum isolation obtained is −20 dB at 2GHz. The peak gain is obtained as 4.1 dB at operating frequency 2.4 GHz. The proposed compact and planar four element MIMO antenna is designed and simulated by using HFSS 14.","PeriodicalId":382417,"journal":{"name":"2017 7th International Conference on Communication Systems and Network Technologies (CSNT)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134144601","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2017 7th International Conference on Communication Systems and Network Technologies (CSNT)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1