Pub Date : 2012-10-01DOI: 10.1109/WICT.2012.6409146
J. Nath, A. Nath
It is now a prime research area to understand microRNA (miRNA) in a quantitative manner. The researchers across the globe have been working on quantitative estimation of microRNA (miRNA) from different angles. Our present study would be a new addition in the present scenario. The miRNAs are non-coding short ribonucleic acid (RNA) molecules, approximately ~25 nucleotides long. MiRNAs help in understanding the entire scope of post-transcriptional gene regulation. MiRNAs regulate numerous cellular processes and have roles in tissue remodeling. In the present work the authors made an exhaustive study on deciphering the inherent statistical behavior in pre-mature miRNA strings through few statistical parameters namely Hurst Exponent values, Variance, Poly String Mean and Poly String Standard Deviation. These four parameters not only quantify miRNA but also classify the miRNA strings. In the present work the authors have to tried to explore the quantification and classification based on statistical results on nucleotide strings of pre-mature miRNAs of the three organisms Homo sapiens (hsa), Macaca mulatta (mml) and Pan troglodytes (ptr).
{"title":"A new algorithm for quantitative deciphering of pre-mature MiRNAs using some statistical parameters","authors":"J. Nath, A. Nath","doi":"10.1109/WICT.2012.6409146","DOIUrl":"https://doi.org/10.1109/WICT.2012.6409146","url":null,"abstract":"It is now a prime research area to understand microRNA (miRNA) in a quantitative manner. The researchers across the globe have been working on quantitative estimation of microRNA (miRNA) from different angles. Our present study would be a new addition in the present scenario. The miRNAs are non-coding short ribonucleic acid (RNA) molecules, approximately ~25 nucleotides long. MiRNAs help in understanding the entire scope of post-transcriptional gene regulation. MiRNAs regulate numerous cellular processes and have roles in tissue remodeling. In the present work the authors made an exhaustive study on deciphering the inherent statistical behavior in pre-mature miRNA strings through few statistical parameters namely Hurst Exponent values, Variance, Poly String Mean and Poly String Standard Deviation. These four parameters not only quantify miRNA but also classify the miRNA strings. In the present work the authors have to tried to explore the quantification and classification based on statistical results on nucleotide strings of pre-mature miRNAs of the three organisms Homo sapiens (hsa), Macaca mulatta (mml) and Pan troglodytes (ptr).","PeriodicalId":445333,"journal":{"name":"2012 World Congress on Information and Communication Technologies","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132087830","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-10-01DOI: 10.1109/WICT.2012.6409157
R. Phalnikar, Pradnya A. Khutade
As more and more web services that provide the same functionality are developed, it is a major issue to consider not only the functional requirements but also the non functional requirement (NFR) during web service discovery process. The NFR define the Quality of Service (QoS) of the system. Much work has been done on web service discovery process that considers the functional requirements as selection criteria. However not many service discovery strategies consider the QoS properties. On the basis of our study and survey, we advocate that the best performance is achieved by use of both functional and NFR properties. We believe that the user NFR should be expressed explicitly to aid in selecting a web service that best fulfils them. To support this claim we present a detailed survey of web service discovery systems that makes use of QoS factors. Paper also highlights the importance of ontology to represent the non functional requirements in web service discovery. We emphasize how Ontology if built and refined by domain experts can be used for web service discovery process with the purpose of reuse and improved design.
{"title":"Survey of QoS based web service discovery","authors":"R. Phalnikar, Pradnya A. Khutade","doi":"10.1109/WICT.2012.6409157","DOIUrl":"https://doi.org/10.1109/WICT.2012.6409157","url":null,"abstract":"As more and more web services that provide the same functionality are developed, it is a major issue to consider not only the functional requirements but also the non functional requirement (NFR) during web service discovery process. The NFR define the Quality of Service (QoS) of the system. Much work has been done on web service discovery process that considers the functional requirements as selection criteria. However not many service discovery strategies consider the QoS properties. On the basis of our study and survey, we advocate that the best performance is achieved by use of both functional and NFR properties. We believe that the user NFR should be expressed explicitly to aid in selecting a web service that best fulfils them. To support this claim we present a detailed survey of web service discovery systems that makes use of QoS factors. Paper also highlights the importance of ontology to represent the non functional requirements in web service discovery. We emphasize how Ontology if built and refined by domain experts can be used for web service discovery process with the purpose of reuse and improved design.","PeriodicalId":445333,"journal":{"name":"2012 World Congress on Information and Communication Technologies","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114037256","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-10-01DOI: 10.1109/WICT.2012.6409186
L. Sharma, S. Dandapat
Compressed sensing is widely used due to its ability to reconstruct the signal accurately from a set of samples which is smaller than the set of samples produced using Nyquist rate. Multi-lead electrocardiogram signals show sparseness in wavelet domain. In this work, compressive sensing is applied for electrocardiogram signals in transform domain using random sensing matrix with independent identically distributed (i.i.d.) entries formed by sampling a Gaussian distribution. The reconstruction of sparsely represented signal is performed by convex optimization problem by L1-norm minimization. The quality of processed signal is satisfactory. Signal distortions are evaluated using percentage root mean square difference (PRD), root mean square error (RMSE), normalized root mean square difference (NRMSD), normalized maximum amplitude error (NMAX) and maximum absolute error (MAE). The lowest PRD value, 1.723%, is found for lead-V5 signal at sparsity level of 26.76%, using database of CSE multi-lead measurement library for simulation.
{"title":"Compressed sensing for multi-lead electrocardiogram signals","authors":"L. Sharma, S. Dandapat","doi":"10.1109/WICT.2012.6409186","DOIUrl":"https://doi.org/10.1109/WICT.2012.6409186","url":null,"abstract":"Compressed sensing is widely used due to its ability to reconstruct the signal accurately from a set of samples which is smaller than the set of samples produced using Nyquist rate. Multi-lead electrocardiogram signals show sparseness in wavelet domain. In this work, compressive sensing is applied for electrocardiogram signals in transform domain using random sensing matrix with independent identically distributed (i.i.d.) entries formed by sampling a Gaussian distribution. The reconstruction of sparsely represented signal is performed by convex optimization problem by L1-norm minimization. The quality of processed signal is satisfactory. Signal distortions are evaluated using percentage root mean square difference (PRD), root mean square error (RMSE), normalized root mean square difference (NRMSD), normalized maximum amplitude error (NMAX) and maximum absolute error (MAE). The lowest PRD value, 1.723%, is found for lead-V5 signal at sparsity level of 26.76%, using database of CSE multi-lead measurement library for simulation.","PeriodicalId":445333,"journal":{"name":"2012 World Congress on Information and Communication Technologies","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128974695","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-10-01DOI: 10.1109/WICT.2012.6409161
G. Keerthi Prasad, I. Khan, N. Chanukotimath, F. Khan
In this paper, we present an unrestricted Kannada online handwritten character recognizer which is viable for real time applications. It handles all basic characters of the Kannada script. In this paper, the proposed Online Handwritten Kannada Character Recognition System (OHKCRS) is discussed in detail. Developing an Online Handwriting Recognition System for Kannada character set to mobile devices would play an important role in making these devices available and usable for the Indian society as Kannada language is spoken in major part of India. In this paper, we present a model for writer-independent online handwriting character recognition for the 51 basic Kannada characters. The proposed system is implemented on mobile device using two different approaches namely Principal Component Analysis (PCA) and Dynamic Time Wrapping (DTW). To find the suitability of these two approaches for handheld devices several experiments were conducted and detailed analysis has been made on the obtained results. The results obtained for PCA approach is quite promising than DTW. On an average, recognition accuracy up to 88% is achieved for the PCA approach and up to 64% is achieved for DTW approach, also the time taken for recognition of unknown character is around 0.8 sec for PCA approach, and around 55 sec for DTW approach, thus the PCA approach is suitable for real-time applications.
{"title":"On-line handwritten character recognition system for Kannada using Principal Component Analysis Approach: For handheld devices","authors":"G. Keerthi Prasad, I. Khan, N. Chanukotimath, F. Khan","doi":"10.1109/WICT.2012.6409161","DOIUrl":"https://doi.org/10.1109/WICT.2012.6409161","url":null,"abstract":"In this paper, we present an unrestricted Kannada online handwritten character recognizer which is viable for real time applications. It handles all basic characters of the Kannada script. In this paper, the proposed Online Handwritten Kannada Character Recognition System (OHKCRS) is discussed in detail. Developing an Online Handwriting Recognition System for Kannada character set to mobile devices would play an important role in making these devices available and usable for the Indian society as Kannada language is spoken in major part of India. In this paper, we present a model for writer-independent online handwriting character recognition for the 51 basic Kannada characters. The proposed system is implemented on mobile device using two different approaches namely Principal Component Analysis (PCA) and Dynamic Time Wrapping (DTW). To find the suitability of these two approaches for handheld devices several experiments were conducted and detailed analysis has been made on the obtained results. The results obtained for PCA approach is quite promising than DTW. On an average, recognition accuracy up to 88% is achieved for the PCA approach and up to 64% is achieved for DTW approach, also the time taken for recognition of unknown character is around 0.8 sec for PCA approach, and around 55 sec for DTW approach, thus the PCA approach is suitable for real-time applications.","PeriodicalId":445333,"journal":{"name":"2012 World Congress on Information and Communication Technologies","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128764744","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-10-01DOI: 10.1109/WICT.2012.6409066
C. Manimegalai, R. Kumar
Extended analysis of the performance of Amplitude Phase Shift Keying (APSK) modulation in the Pulsed-OFDM Ultra Wide Band (UWB) communication systems. APSK is recognized as spectrally efficient baseband modulation scheme. The objective of this paper is to elaborate on the 16-APSK performance in the Pulsed-OFDM UWB Communication systems and to provide the comparison with Multiband-OFDM Systems. The performance of APSK modulation for Wireless Personal Area Networks (WPAN) is analyzed for different UWB indoor propagation channels (CM1, CM2, CM3 and CM4) provided by the IEEE 802.15.3a Standard activity committee and its performance is compared with MB-OFDM.
{"title":"Efficacy of 16-APSK modulation for Multiband Pulsed-OFDM UWB-communication systems","authors":"C. Manimegalai, R. Kumar","doi":"10.1109/WICT.2012.6409066","DOIUrl":"https://doi.org/10.1109/WICT.2012.6409066","url":null,"abstract":"Extended analysis of the performance of Amplitude Phase Shift Keying (APSK) modulation in the Pulsed-OFDM Ultra Wide Band (UWB) communication systems. APSK is recognized as spectrally efficient baseband modulation scheme. The objective of this paper is to elaborate on the 16-APSK performance in the Pulsed-OFDM UWB Communication systems and to provide the comparison with Multiband-OFDM Systems. The performance of APSK modulation for Wireless Personal Area Networks (WPAN) is analyzed for different UWB indoor propagation channels (CM1, CM2, CM3 and CM4) provided by the IEEE 802.15.3a Standard activity committee and its performance is compared with MB-OFDM.","PeriodicalId":445333,"journal":{"name":"2012 World Congress on Information and Communication Technologies","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129238536","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-10-01DOI: 10.1109/WICT.2012.6409097
R. Hosur, S. Hatture, R. Karchi
Biometric technologies' have become the basis for highly secure identification and personnel verification in authentication and identification systems, based on the physical identifiable details or behavioral characteristics which cannot be imposter easily. Hence, the system has been treated to be the tough security measures to identify the user being genuine by avoiding the third party attack. But these systems are unable to judge whether the user who is providing the required authentication details is an impostor or genuine. To eliminate this flaw in biometric based security systems, the model proposed in this paper can be embedded in existing security systems to prevent the spoof attack. The proposed model comprises of two independent models namely Cryptographic based authentication system (model 1) and Text prompted authentication system (model 2). Model 1 has been designed by the most efficient cryptographic algorithm RSA which generates a secret key by using a pseudo-random number given by user for secure system access. In model 2, the user is made interactive with the system by prompting a question from a set of 15 questions, and authenticating the user with the help of correct answer provided by user. To provide higher level of security, MD5 (Message Digest 5) algorithm is integrated with RSA. The developed models provide promising level of security along with a biometric trait.
{"title":"A cryptographic approach to prevent a spoof attack for secure information retrieval in a biometrie system","authors":"R. Hosur, S. Hatture, R. Karchi","doi":"10.1109/WICT.2012.6409097","DOIUrl":"https://doi.org/10.1109/WICT.2012.6409097","url":null,"abstract":"Biometric technologies' have become the basis for highly secure identification and personnel verification in authentication and identification systems, based on the physical identifiable details or behavioral characteristics which cannot be imposter easily. Hence, the system has been treated to be the tough security measures to identify the user being genuine by avoiding the third party attack. But these systems are unable to judge whether the user who is providing the required authentication details is an impostor or genuine. To eliminate this flaw in biometric based security systems, the model proposed in this paper can be embedded in existing security systems to prevent the spoof attack. The proposed model comprises of two independent models namely Cryptographic based authentication system (model 1) and Text prompted authentication system (model 2). Model 1 has been designed by the most efficient cryptographic algorithm RSA which generates a secret key by using a pseudo-random number given by user for secure system access. In model 2, the user is made interactive with the system by prompting a question from a set of 15 questions, and authenticating the user with the help of correct answer provided by user. To provide higher level of security, MD5 (Message Digest 5) algorithm is integrated with RSA. The developed models provide promising level of security along with a biometric trait.","PeriodicalId":445333,"journal":{"name":"2012 World Congress on Information and Communication Technologies","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116688796","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-10-01DOI: 10.1109/WICT.2012.6409049
V. Anand, S. Gupta
MANET Mobile ad-hoc networks - are fully distributed networks that comprise of mobile nodes resulting in dynamic topology. These networks follow multi-hop routing where in intermediate mobile nodes are used to pass on messages. In this paper, we report results of NS2 simulation of three important routing protocols: AODV, DSR and DSDV. We have analyzed performance using average throughput and average end to end delay when number of nodes, and also their mobility, is varied. For node movement, a popular model, random waypoint is considered while Constant Bit Rate (CBR) traffic pattern is assumed.
{"title":"Performance of AODV, DSR and DSDV protocols under varying node movement","authors":"V. Anand, S. Gupta","doi":"10.1109/WICT.2012.6409049","DOIUrl":"https://doi.org/10.1109/WICT.2012.6409049","url":null,"abstract":"MANET Mobile ad-hoc networks - are fully distributed networks that comprise of mobile nodes resulting in dynamic topology. These networks follow multi-hop routing where in intermediate mobile nodes are used to pass on messages. In this paper, we report results of NS2 simulation of three important routing protocols: AODV, DSR and DSDV. We have analyzed performance using average throughput and average end to end delay when number of nodes, and also their mobility, is varied. For node movement, a popular model, random waypoint is considered while Constant Bit Rate (CBR) traffic pattern is assumed.","PeriodicalId":445333,"journal":{"name":"2012 World Congress on Information and Communication Technologies","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127156305","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-10-01DOI: 10.1109/WICT.2012.6409106
T. Jeyapoovan, M. Murugan, B. C. Bovas
Stylus profilers are still used as a successful method for surface roughness measurement in spite of its stylus tip diameter that acts as a low pass filter on steep valley on rough surfaces. The setup and operation time for surface measurements using a stylus profiler is considerably high. Hence a reliable non-contact optical technique for surface measurements has good potential for surface measurements based on the availability of a powerful CCD camera and fast processing digital computers. When a rough surface is illuminated with a coherent laser source, a speckle image is formed due to the scattering of light rays on the rough surface. The speckle pattern thus obtained can be used for surface roughness measurements. The contrast of the speckle image is processed to evaluate the surface roughness using the surface image parameters. Statistical parameters such as mean, variance, standard deviation, skew and kurtosis were used to analyze surface roughness using the pixel intensity of the surface images. Milled and ground surface specimens were used, and the images obtained were processed using MATLAB software.
{"title":"Statistical analysis of surface roughness measurements using laser speckle images","authors":"T. Jeyapoovan, M. Murugan, B. C. Bovas","doi":"10.1109/WICT.2012.6409106","DOIUrl":"https://doi.org/10.1109/WICT.2012.6409106","url":null,"abstract":"Stylus profilers are still used as a successful method for surface roughness measurement in spite of its stylus tip diameter that acts as a low pass filter on steep valley on rough surfaces. The setup and operation time for surface measurements using a stylus profiler is considerably high. Hence a reliable non-contact optical technique for surface measurements has good potential for surface measurements based on the availability of a powerful CCD camera and fast processing digital computers. When a rough surface is illuminated with a coherent laser source, a speckle image is formed due to the scattering of light rays on the rough surface. The speckle pattern thus obtained can be used for surface roughness measurements. The contrast of the speckle image is processed to evaluate the surface roughness using the surface image parameters. Statistical parameters such as mean, variance, standard deviation, skew and kurtosis were used to analyze surface roughness using the pixel intensity of the surface images. Milled and ground surface specimens were used, and the images obtained were processed using MATLAB software.","PeriodicalId":445333,"journal":{"name":"2012 World Congress on Information and Communication Technologies","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121988713","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-10-01DOI: 10.1109/WICT.2012.6409131
J. Medhi, M. K. Nath, S. Dandapat
Diabetic retinopathy causes blindness due to the physiological changes in the retina of human eye, which occurs due to the progression of diabetes. Diabetic retinopathy images differ from normal fundus images by lesions such as: microaneurysm, hemorrhages, exudates, cotton wool spots and variations in blood vessels etc. Appearance of these features on the retina leads to vision loss. The sharp vision is affected severely when the features appear on the macula as it contains higher concentration of cones. In this paper macula and fovea (macula center) are detected based on the localization. The detection of these feature is essential for automatic grading of macular edema or degeneration. Depending on the number of lesions on the macula the severity of the macular degeneration can be predicted. The method is tested on DRIVE, Aria and DIARETDB1 databases. The method successfully detects the macula and fovea for all the images. The accuracy of the proposed method of macula detection is found to be 100% in normal images. The method is also applied on images with lesions. Here the overlapped region of the macula and lesions are detected to find the severity of macular degeneration.
{"title":"Automatic grading of macular degeneration from color fundus images","authors":"J. Medhi, M. K. Nath, S. Dandapat","doi":"10.1109/WICT.2012.6409131","DOIUrl":"https://doi.org/10.1109/WICT.2012.6409131","url":null,"abstract":"Diabetic retinopathy causes blindness due to the physiological changes in the retina of human eye, which occurs due to the progression of diabetes. Diabetic retinopathy images differ from normal fundus images by lesions such as: microaneurysm, hemorrhages, exudates, cotton wool spots and variations in blood vessels etc. Appearance of these features on the retina leads to vision loss. The sharp vision is affected severely when the features appear on the macula as it contains higher concentration of cones. In this paper macula and fovea (macula center) are detected based on the localization. The detection of these feature is essential for automatic grading of macular edema or degeneration. Depending on the number of lesions on the macula the severity of the macular degeneration can be predicted. The method is tested on DRIVE, Aria and DIARETDB1 databases. The method successfully detects the macula and fovea for all the images. The accuracy of the proposed method of macula detection is found to be 100% in normal images. The method is also applied on images with lesions. Here the overlapped region of the macula and lesions are detected to find the severity of macular degeneration.","PeriodicalId":445333,"journal":{"name":"2012 World Congress on Information and Communication Technologies","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128083335","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-10-01DOI: 10.1109/WICT.2012.6409195
S. Singh, E. Mittal, G. Sachdeva
Biogeography-Based Optimization (BBO) is one of the recently developed population based algorithms which has shown impressive performance over other Evolutionary Algorithms (EAs). BBO is based on the study of geographical distribution of biological organisms over space and time. Yagi-Uda antenna design is most widely used antenna at VHF and UHF frequencies due to high gain, directivity and ease of construction. However, designing a Yagi-Uda antenna that involves determination of wire-lengths and spacings is highly complex and non-linear problem. If gain is intended to increase then imaginary part in impedance becomes significant. In this paper Non-dominated Sorting BBO (NSBBO) is proposed and investigated for Multi-objective optimization of six-element Yagi-Uda antenna designs to optimize two objectives, viz., gain and impedance, simultaneously. The best results and BBO flow are presented in the ending sections of the paper.
{"title":"NSBBO for gain-impedance optimization of Yagi-Uda antenna design","authors":"S. Singh, E. Mittal, G. Sachdeva","doi":"10.1109/WICT.2012.6409195","DOIUrl":"https://doi.org/10.1109/WICT.2012.6409195","url":null,"abstract":"Biogeography-Based Optimization (BBO) is one of the recently developed population based algorithms which has shown impressive performance over other Evolutionary Algorithms (EAs). BBO is based on the study of geographical distribution of biological organisms over space and time. Yagi-Uda antenna design is most widely used antenna at VHF and UHF frequencies due to high gain, directivity and ease of construction. However, designing a Yagi-Uda antenna that involves determination of wire-lengths and spacings is highly complex and non-linear problem. If gain is intended to increase then imaginary part in impedance becomes significant. In this paper Non-dominated Sorting BBO (NSBBO) is proposed and investigated for Multi-objective optimization of six-element Yagi-Uda antenna designs to optimize two objectives, viz., gain and impedance, simultaneously. The best results and BBO flow are presented in the ending sections of the paper.","PeriodicalId":445333,"journal":{"name":"2012 World Congress on Information and Communication Technologies","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121614052","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}