首页 > 最新文献

2017 7th International Conference on Communication Systems and Network Technologies (CSNT)最新文献

英文 中文
Voltage harmonic reduction using passive filter shunt passive-active filters for non-linear load 采用无源滤波器并联无源滤波器对非线性负载进行电压谐波抑制
Rajeshwari, A. Bagwari
We know that the rise of harmonics is a major problem now days in non-linear loads. The universal use of non-linear loads like in power electronics equipment which amplified the harmonic-related difficulties in service and trade power systems this make an essential requirement of filter. The nonlinear loads be compensated & sometime we can identified but sometimes they include their own non characteristic harmonic portion & not ideal as it is actual in input & voltage sag occur so many times in a day. As increasing the harmonic magnitude component contribution of key problem also rises in industrial sector, so this is a very complex in power system, to overcome we using different methods to reduce this major problem. This paper is presents a proposed model of passive Alter & combination of shunt active & passive filter to reducing harmonic limits in single-phase system as tracked by IEEE std. 519-1992.
我们知道谐波的上升是现在非线性负载的一个主要问题。电力电子设备等非线性负载的普遍使用,放大了服务和贸易电力系统中与谐波相关的困难,这对滤波器提出了基本要求。非线性负载被补偿,有时我们可以识别,但有时它们包含自己的非特征谐波部分,并且不理想,因为它在输入中是实际的,电压凹陷在一天中会发生很多次。随着谐波幅值的增加,各分量贡献的关键问题在工业部门也随之上升,因此这是电力系统中一个非常复杂的问题,为了克服这一问题我们采用了不同的方法来降低这一重大问题。根据IEEE标准519-1992,提出了一种降低单相系统谐波限值的无源变换和并联有源无源滤波器组合模型。
{"title":"Voltage harmonic reduction using passive filter shunt passive-active filters for non-linear load","authors":"Rajeshwari, A. Bagwari","doi":"10.1109/CSNT.2017.8418524","DOIUrl":"https://doi.org/10.1109/CSNT.2017.8418524","url":null,"abstract":"We know that the rise of harmonics is a major problem now days in non-linear loads. The universal use of non-linear loads like in power electronics equipment which amplified the harmonic-related difficulties in service and trade power systems this make an essential requirement of filter. The nonlinear loads be compensated & sometime we can identified but sometimes they include their own non characteristic harmonic portion & not ideal as it is actual in input & voltage sag occur so many times in a day. As increasing the harmonic magnitude component contribution of key problem also rises in industrial sector, so this is a very complex in power system, to overcome we using different methods to reduce this major problem. This paper is presents a proposed model of passive Alter & combination of shunt active & passive filter to reducing harmonic limits in single-phase system as tracked by IEEE std. 519-1992.","PeriodicalId":382417,"journal":{"name":"2017 7th International Conference on Communication Systems and Network Technologies (CSNT)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131667816","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 35
Predictive analytics in data science for business intelligence solutions 商业智能解决方案的数据科学预测分析
P. Wazurkar, R. S. Bhadoria, Dhananjai Bajpai
In modern era of computing, organizations are focusing on the better utilization of technology and surviving to gear-up with global business demand. Such competition is acting as a driving force for its business to cope-up the data which generated every second of minute. This data needs to figure out and segregated with information which is required for is business growth model. The Predictive Analytics (PA) uses various algorithms to find out different patterns in large data that might suggest the efficient behavior for business solution. This paper provides a conceptual decision making process for data using predictive analysis to maximize the success ratio for handling large dataset. Today, different technologies like cloud computing, SOA, are together transforming information technology but in turn, are imposing new complexities to the data computation. Due to such advances in technologies, and it requires rapid and dynamic data analysis for structured and unstructured data.
在现代计算时代,组织正专注于更好地利用技术和生存,以适应全球业务需求。这种竞争正成为其业务应对每分每秒产生的数据的推动力。这些数据需要与业务增长模型所需的信息进行区分和分离。预测分析(PA)使用各种算法在大数据中发现可能建议业务解决方案的有效行为的不同模式。本文提供了一个概念性的数据决策过程,利用预测分析来最大化处理大型数据集的成功率。今天,云计算、SOA等不同的技术共同改变了信息技术,但反过来又给数据计算带来了新的复杂性。由于技术的进步,它需要对结构化和非结构化数据进行快速和动态的数据分析。
{"title":"Predictive analytics in data science for business intelligence solutions","authors":"P. Wazurkar, R. S. Bhadoria, Dhananjai Bajpai","doi":"10.1109/CSNT.2017.8418568","DOIUrl":"https://doi.org/10.1109/CSNT.2017.8418568","url":null,"abstract":"In modern era of computing, organizations are focusing on the better utilization of technology and surviving to gear-up with global business demand. Such competition is acting as a driving force for its business to cope-up the data which generated every second of minute. This data needs to figure out and segregated with information which is required for is business growth model. The Predictive Analytics (PA) uses various algorithms to find out different patterns in large data that might suggest the efficient behavior for business solution. This paper provides a conceptual decision making process for data using predictive analysis to maximize the success ratio for handling large dataset. Today, different technologies like cloud computing, SOA, are together transforming information technology but in turn, are imposing new complexities to the data computation. Due to such advances in technologies, and it requires rapid and dynamic data analysis for structured and unstructured data.","PeriodicalId":382417,"journal":{"name":"2017 7th International Conference on Communication Systems and Network Technologies (CSNT)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132105093","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 33
Data visualization through R and Azure for scaling machine training sets 通过R和Azure进行数据可视化,用于缩放机器训练集
R. Pandey, Nidhi Srivastava, Komal Verma
Data Visualization involves the creation and study of the visual representation of data. This paper involves the integration of R Studio with Microsoft Azure. It will be used to analyze the "Adult Dataset (adult.csv)", which consists of various attributes based on which graphs will be made for visual representation of dataset. Several inferences have been drawn from the analysis and graphical representation of the dataset.
数据可视化涉及数据可视化表示的创建和研究。本文涉及到R Studio与Microsoft Azure的集成。它将用于分析“成人数据集(Adult .csv)”,该数据集由各种属性组成,将根据这些属性制作图形以实现数据集的可视化表示。从数据集的分析和图形表示中得出了几个推论。
{"title":"Data visualization through R and Azure for scaling machine training sets","authors":"R. Pandey, Nidhi Srivastava, Komal Verma","doi":"10.1109/CSNT.2017.8418564","DOIUrl":"https://doi.org/10.1109/CSNT.2017.8418564","url":null,"abstract":"Data Visualization involves the creation and study of the visual representation of data. This paper involves the integration of R Studio with Microsoft Azure. It will be used to analyze the \"Adult Dataset (adult.csv)\", which consists of various attributes based on which graphs will be made for visual representation of dataset. Several inferences have been drawn from the analysis and graphical representation of the dataset.","PeriodicalId":382417,"journal":{"name":"2017 7th International Conference on Communication Systems and Network Technologies (CSNT)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114401722","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
K-means clustering with adaptive threshold for segmentation of hand images 基于自适应阈值的k均值聚类手部图像分割
Sheifalee Trivedi, B. Nandwana, D. Khunteta, S. Narayan
As we all know an image is an artifact that depicts visual perception. In order to extract information or modify those images we have to perform some operation on it. In this paper we present a methodology to segment hand images using modified k-means clustering with value of threshold and analysis of histogram. Experimental results show 97% accurate results so we can say proposed methodology is better then previous.
我们都知道,图像是一种描绘视觉感知的人工制品。为了提取信息或修改这些图像,我们必须对其进行一些操作。本文提出了一种基于阈值和直方图分析的改进k均值聚类方法对手图像进行分割。实验结果表明,该方法的准确率为97%,优于以往的方法。
{"title":"K-means clustering with adaptive threshold for segmentation of hand images","authors":"Sheifalee Trivedi, B. Nandwana, D. Khunteta, S. Narayan","doi":"10.1109/CSNT.2017.8418534","DOIUrl":"https://doi.org/10.1109/CSNT.2017.8418534","url":null,"abstract":"As we all know an image is an artifact that depicts visual perception. In order to extract information or modify those images we have to perform some operation on it. In this paper we present a methodology to segment hand images using modified k-means clustering with value of threshold and analysis of histogram. Experimental results show 97% accurate results so we can say proposed methodology is better then previous.","PeriodicalId":382417,"journal":{"name":"2017 7th International Conference on Communication Systems and Network Technologies (CSNT)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114640611","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Analysis of numerical interleaver for IDMA scheme IDMA方案的数值交织分析
S. Srivastava, Shivani Dixit, M. Shukla
This research work presents a novel numerical interleaver for generation of user specific interleaving sequences, for interleave-division multiple-access (IDMA) system. In general, all the interleaving sequences, used by users, need to be transferred to receiver side for extracting the user specific data with help of de-interleaving process. In the proposed interleaver, there is no need to transfer any interleaving sequences to the receiver. This interleaver eliminates the problem of high consumption of bandwidth as the interleaved sequences depend only on few parameters and it can be easily generated at the receiver if receiver system is aware of these parameters. To make comparison with other interleavers, the bit error rate (BER) performance analysis has been performed under Additive White Gaussian Noise (AWGN) channel conditions based on the computer MATLAB simulations. The simulation results demonstrate that the proposed numerical interleaver provides better BER performance since it allows the communication system to easily check for more orthogonal interleaving patterns by changing the values of few parameters.
本文提出了一种新的数字交织器,用于交错分割多址(IDMA)系统中用户特定交织序列的生成。一般情况下,用户使用的所有交错序列都需要转移到接收端,通过去交错处理提取用户特定的数据。在所提出的交织器中,不需要向接收端传输任何交织序列。该交织器消除了由于交织序列只依赖于很少的参数而造成的高带宽消耗的问题,并且如果接收系统知道这些参数,则可以很容易地在接收端生成交织序列。为了与其他交织器进行比较,在加性高斯白噪声(AWGN)信道条件下进行了误码率(BER)性能分析。仿真结果表明,所提出的数字交织器可以通过改变几个参数的值,方便地检测出更多的正交交织模式,从而提高了通信系统的误码率。
{"title":"Analysis of numerical interleaver for IDMA scheme","authors":"S. Srivastava, Shivani Dixit, M. Shukla","doi":"10.1109/CSNT.2017.8418502","DOIUrl":"https://doi.org/10.1109/CSNT.2017.8418502","url":null,"abstract":"This research work presents a novel numerical interleaver for generation of user specific interleaving sequences, for interleave-division multiple-access (IDMA) system. In general, all the interleaving sequences, used by users, need to be transferred to receiver side for extracting the user specific data with help of de-interleaving process. In the proposed interleaver, there is no need to transfer any interleaving sequences to the receiver. This interleaver eliminates the problem of high consumption of bandwidth as the interleaved sequences depend only on few parameters and it can be easily generated at the receiver if receiver system is aware of these parameters. To make comparison with other interleavers, the bit error rate (BER) performance analysis has been performed under Additive White Gaussian Noise (AWGN) channel conditions based on the computer MATLAB simulations. The simulation results demonstrate that the proposed numerical interleaver provides better BER performance since it allows the communication system to easily check for more orthogonal interleaving patterns by changing the values of few parameters.","PeriodicalId":382417,"journal":{"name":"2017 7th International Conference on Communication Systems and Network Technologies (CSNT)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123299727","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Tor traffic identification Tor 流量识别
P. Mayank, A. K. Singh
Today anonymity and privacy are the major concerns of Internet users. There are several types and implementations of anonymizing services available on the Internet. Tor is one of the services among those services. Tor networks are based on onion routing concept, and is now very popular. Surprisingly, very few research has been done on such an anonymizing network. Activist, journalist and writers use this tool for their freedom of speech, but it is also mis-used by malware, distributed denial of service attacks, hidden services that sells illegal things, spams, and many more. This paper will explain Tor usage detection by analysing the TLS connection that is used to make the connection secure and using the characteristics found during analysis to detect and block the Tor traffic originated from Tor browser.
如今,匿名和隐私是互联网用户最关心的问题。互联网上有多种类型和实现方式的匿名服务。Tor 就是其中之一。Tor 网络基于洋葱路由概念,现在非常流行。令人惊讶的是,关于这种匿名网络的研究却寥寥无几。活动家、记者和作家使用这一工具来维护言论自由,但它也被恶意软件、分布式拒绝服务攻击、销售非法物品的隐藏服务、垃圾邮件等滥用。本文将通过分析用于确保连接安全的 TLS 连接,并利用分析过程中发现的特征来检测和阻止源自 Tor 浏览器的 Tor 流量,从而解释如何检测 Tor 的使用情况。
{"title":"Tor traffic identification","authors":"P. Mayank, A. K. Singh","doi":"10.1109/CSNT.2017.8418516","DOIUrl":"https://doi.org/10.1109/CSNT.2017.8418516","url":null,"abstract":"Today anonymity and privacy are the major concerns of Internet users. There are several types and implementations of anonymizing services available on the Internet. Tor is one of the services among those services. Tor networks are based on onion routing concept, and is now very popular. Surprisingly, very few research has been done on such an anonymizing network. Activist, journalist and writers use this tool for their freedom of speech, but it is also mis-used by malware, distributed denial of service attacks, hidden services that sells illegal things, spams, and many more. This paper will explain Tor usage detection by analysing the TLS connection that is used to make the connection secure and using the characteristics found during analysis to detect and block the Tor traffic originated from Tor browser.","PeriodicalId":382417,"journal":{"name":"2017 7th International Conference on Communication Systems and Network Technologies (CSNT)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129578093","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Emotion detection through fusion of complementary facial features 基于互补面部特征融合的情感检测
N. Rathee, Ashutosh Vaish, Sagar Gupta
Facial Feature extraction is used in a number of applications including emotion detection. In the following approach various popular feature descriptors, including Gabor features, HOG, DWT were computed. We have fused features using Multiview Distance Metric Learning (MDML) which utilizes complementary features of the images to extract every known detail while eliminating the redundant features. Moreover MDML maps the features extracted from the dataset to higher discriminative space. The features belonging to the same class are brought closer and those that are from different classes are forced away by the MDML thereby increasing the accuracy of the classifier employed. CK+ Dataset has been used to conduct the experiments. Experimental results represent the efficacy of the method is 93.5% displaying the potential of the recommended manner.
面部特征提取在许多应用中都有应用,包括情绪检测。在下面的方法中,计算了各种流行的特征描述符,包括Gabor特征、HOG、DWT。我们使用多视图距离度量学习(MDML)融合特征,它利用图像的互补特征提取每个已知细节,同时消除冗余特征。此外,MDML将从数据集中提取的特征映射到更高的判别空间。属于同一类的特征被拉近,而那些来自不同类的特征被MDML赶走,从而提高了所使用分类器的准确性。使用CK+数据集进行实验。实验结果表明,该方法的有效性为93.5%,显示了推荐方法的潜力。
{"title":"Emotion detection through fusion of complementary facial features","authors":"N. Rathee, Ashutosh Vaish, Sagar Gupta","doi":"10.1109/CSNT.2017.8418530","DOIUrl":"https://doi.org/10.1109/CSNT.2017.8418530","url":null,"abstract":"Facial Feature extraction is used in a number of applications including emotion detection. In the following approach various popular feature descriptors, including Gabor features, HOG, DWT were computed. We have fused features using Multiview Distance Metric Learning (MDML) which utilizes complementary features of the images to extract every known detail while eliminating the redundant features. Moreover MDML maps the features extracted from the dataset to higher discriminative space. The features belonging to the same class are brought closer and those that are from different classes are forced away by the MDML thereby increasing the accuracy of the classifier employed. CK+ Dataset has been used to conduct the experiments. Experimental results represent the efficacy of the method is 93.5% displaying the potential of the recommended manner.","PeriodicalId":382417,"journal":{"name":"2017 7th International Conference on Communication Systems and Network Technologies (CSNT)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126135948","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Enhancement in data security using cryptography and compression 使用加密和压缩增强数据安全性
Shariqua Izhar, Anchal Kaushal, Ramsha Fatima, M. Qadeer
In today's scenario, where everything is internet based, there is a huge demand for data security. A large number of cryptographic techniques are available to handle this problem. To increase data security, data can first be compressed using compression techniques and then encryption techniques can be applied. In this paper, we are proposing two new algorithms for encryption in which we have incorporated the concept of diffusion and confusion. The algorithms are based on Transposition cipher, Substitution cipher and Symmetric Key Encryption. Brute force on these algorithms can't be done so easily. These can be applied along with data compression to get more security.
在今天的场景中,一切都是基于互联网的,对数据安全有巨大的需求。有大量的加密技术可用于处理此问题。为了提高数据安全性,可以先使用压缩技术对数据进行压缩,然后再应用加密技术。在本文中,我们提出了两种新的加密算法,其中我们纳入了扩散和混淆的概念。该算法基于换位密码、替换密码和对称密钥加密。暴力破解这些算法不是那么容易的。这些可以与数据压缩一起应用,以获得更高的安全性。
{"title":"Enhancement in data security using cryptography and compression","authors":"Shariqua Izhar, Anchal Kaushal, Ramsha Fatima, M. Qadeer","doi":"10.1109/CSNT.2017.8418539","DOIUrl":"https://doi.org/10.1109/CSNT.2017.8418539","url":null,"abstract":"In today's scenario, where everything is internet based, there is a huge demand for data security. A large number of cryptographic techniques are available to handle this problem. To increase data security, data can first be compressed using compression techniques and then encryption techniques can be applied. In this paper, we are proposing two new algorithms for encryption in which we have incorporated the concept of diffusion and confusion. The algorithms are based on Transposition cipher, Substitution cipher and Symmetric Key Encryption. Brute force on these algorithms can't be done so easily. These can be applied along with data compression to get more security.","PeriodicalId":382417,"journal":{"name":"2017 7th International Conference on Communication Systems and Network Technologies (CSNT)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131535874","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Design of 60GHz broadband LNA for 5G cellular using 65nm CMOS technology 基于65nm CMOS技术的5G蜂窝60GHz宽带LNA设计
S. Pournamy, Navin Kumar
In this paper, 60GHz millimeter wave (mmWave) two stage common source (CS) cascode low noise amplifier (LNA) with degenerative inductor is designed in 65nm CMOS technology. It has a wide band (57–64GHz) and highly stable characteristics. We have also proposed two different techniques to design the LNA unconditionally stable and increase its linearity without degrading other performancemetrics. Simulation results of a two stage LNA without the stability improvisation show a peak gain of 24.5dB at 61GHz, input return loss of −9.1dB, noise factor (NF) of 1.5dB, static power dissipation Pdc of 6.63mW and is conditionally stable. In one of the methods of designing LNA unconditionally stable is to reduce the gain to 19.5dB by incorporating an additional inductor at the source of second stage amplifier. Linearity is also increased to P1dB of −2.44dBm without degradation of other parameters. Another approach is to maintain the peak gain greater than 22dB by increasing the transconductance of the CMOS transistors. This increases the return loss to −14.5dB. Various obtained results are presented and discussed.
基于65nm CMOS技术,设计了60GHz毫米波两级共源级联低噪声放大器(LNA)。它具有宽带(57-64GHz)和高度稳定的特性。我们还提出了两种不同的技术来设计LNA无条件稳定和提高其线性度而不降低其他性能。仿真结果表明,无稳定性即兴设计的两级LNA在61GHz时峰值增益为24.5dB,输入回波损耗为- 9.1dB,噪声系数(NF)为1.5dB,静态功耗Pdc为6.63mW,具有条件稳定性。设计LNA无条件稳定的方法之一是在二级放大器的源端增加一个额外的电感,将增益降低到19.5dB。线性度也增加到- 2.44dBm的P1dB,而没有其他参数的退化。另一种方法是通过增加CMOS晶体管的跨导来保持峰值增益大于22dB。这使回波损耗增加到- 14.5dB。提出并讨论了各种得到的结果。
{"title":"Design of 60GHz broadband LNA for 5G cellular using 65nm CMOS technology","authors":"S. Pournamy, Navin Kumar","doi":"10.1109/CSNT.2017.8418559","DOIUrl":"https://doi.org/10.1109/CSNT.2017.8418559","url":null,"abstract":"In this paper, 60GHz millimeter wave (mmWave) two stage common source (CS) cascode low noise amplifier (LNA) with degenerative inductor is designed in 65nm CMOS technology. It has a wide band (57–64GHz) and highly stable characteristics. We have also proposed two different techniques to design the LNA unconditionally stable and increase its linearity without degrading other performancemetrics. Simulation results of a two stage LNA without the stability improvisation show a peak gain of 24.5dB at 61GHz, input return loss of −9.1dB, noise factor (NF) of 1.5dB, static power dissipation Pdc of 6.63mW and is conditionally stable. In one of the methods of designing LNA unconditionally stable is to reduce the gain to 19.5dB by incorporating an additional inductor at the source of second stage amplifier. Linearity is also increased to P1dB of −2.44dBm without degradation of other parameters. Another approach is to maintain the peak gain greater than 22dB by increasing the transconductance of the CMOS transistors. This increases the return loss to −14.5dB. Various obtained results are presented and discussed.","PeriodicalId":382417,"journal":{"name":"2017 7th International Conference on Communication Systems and Network Technologies (CSNT)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133096811","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
All time tracking system for recovering stolen devices even in power-off state 所有的时间跟踪系统,恢复被盗设备,即使在断电状态
Mohd Aijaj Khan, Anubhav Tripathi, M. Dixit
This concept is about tracking a smartphone using a GPS independent of state whether the smartphone is switched on or off. When the user makes a request to track, the receiver receives the request and then triggers the GPS to locate the device. Further, the GPS obtains location data in the form of geographical co-ordinates which is then processed by the chip and transmit the latest co-ordinates to the user. Since independent power supply is used, under any circumstances our smartphone can be easily tracked by the user.
这个概念是关于使用独立于智能手机打开或关闭状态的GPS来跟踪智能手机。当用户发出跟踪请求时,接收器会收到请求,然后触发GPS对设备进行定位。此外,GPS以地理坐标的形式获取位置数据,然后由芯片处理并将最新的坐标传输给用户。由于使用了独立的电源,在任何情况下,我们的智能手机都可以很容易地被用户跟踪。
{"title":"All time tracking system for recovering stolen devices even in power-off state","authors":"Mohd Aijaj Khan, Anubhav Tripathi, M. Dixit","doi":"10.1109/CSNT.2017.8418549","DOIUrl":"https://doi.org/10.1109/CSNT.2017.8418549","url":null,"abstract":"This concept is about tracking a smartphone using a GPS independent of state whether the smartphone is switched on or off. When the user makes a request to track, the receiver receives the request and then triggers the GPS to locate the device. Further, the GPS obtains location data in the form of geographical co-ordinates which is then processed by the chip and transmit the latest co-ordinates to the user. Since independent power supply is used, under any circumstances our smartphone can be easily tracked by the user.","PeriodicalId":382417,"journal":{"name":"2017 7th International Conference on Communication Systems and Network Technologies (CSNT)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123593202","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
2017 7th International Conference on Communication Systems and Network Technologies (CSNT)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1