Pub Date : 2017-02-01DOI: 10.1109/ICCCT2.2017.7972291
S. S., B. S, Ajitha X, Anitha K.M
Wireless sensor network consists of independent device spatially distributed in the wireless network with sensor that observes the environment conditions. The cluster based transaction is the gateway of wireless medium and distributed nodes has limitations in power supply. Packet scheduling is the mandatory process in wireless networks to balance the network and minimize the end delay. In energy efficient clustering approach the SNR based node selection is the recent development. As in the proposed process, the overall packet data scheduled according to the High Powered Multilevel priority scheduling, the scheduled data transmitted between the clusters and the base station consists of transmission node in between them. The transmission node is been selected according to the SNR value between the cluster head and the base station.
{"title":"Signal to noise ratio based clustering approach for energy efficient WSN","authors":"S. S., B. S, Ajitha X, Anitha K.M","doi":"10.1109/ICCCT2.2017.7972291","DOIUrl":"https://doi.org/10.1109/ICCCT2.2017.7972291","url":null,"abstract":"Wireless sensor network consists of independent device spatially distributed in the wireless network with sensor that observes the environment conditions. The cluster based transaction is the gateway of wireless medium and distributed nodes has limitations in power supply. Packet scheduling is the mandatory process in wireless networks to balance the network and minimize the end delay. In energy efficient clustering approach the SNR based node selection is the recent development. As in the proposed process, the overall packet data scheduled according to the High Powered Multilevel priority scheduling, the scheduled data transmitted between the clusters and the base station consists of transmission node in between them. The transmission node is been selected according to the SNR value between the cluster head and the base station.","PeriodicalId":445567,"journal":{"name":"2017 2nd International Conference on Computing and Communications Technologies (ICCCT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129697687","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-02-01DOI: 10.1109/iccct2.2017.7972261
Bhuvanapriya R., Rozil Banu S., Sivapriya P., Kalaiselvi V.K.G.
The main objective of the democracy is “vote” by which the people can elect the candidates for forming an efficient government to satisfy their needs and requests such that their standard living can be improved. In developing countries like “INDIA” the election commission follows manual voting mechanism which is done by electronic voting machine. This machine is placed in the poll booth centre and is monitored by higher officials. due to some illegal activities the polling centre are misused and people's vote to right has been denied. This seldom occurs in rural areas as well as in urban cities because the educated people are not interested in casting their votes to candidates who represent their respective areas. To ensure 100% voting automation came into play. But this automated system have been approved only on some developed countries since security have not been ensured to a large extent. Our main aim of the proposed system is to develop a compatible voting machine with high security. The proposed system is mainly designed for our country. It has three phases. First the details of the persons who are above 18years are extracted from aadhar card database since it had became mandatory in present scenario. Automatically a new voter id with necessary details will be created and an intimation will be given to the persons through their e-mail. At the time of voting, the user can specify their id and password. To ensure more security, finger prints of the voter is used as the main authentication resource. Since the finger pattern of each human being is different, the voter can be easily authenticated. The system allow the voter to vote through his fingerprint. Finger print is used to uniquely identify the user. The finger print minutiae features are different for each human being. Finger print is used as a authentication of the voters. As soon as they cast their vote, their voter id and other details will be erased automatically and the aadhar card details which they used will be tracked and will be locked to access. This is done to preserve the security. When people cast their vote the results will be updated automatically and on the same day of election, the results will also be published. Also our proposed system supports the online voting too.
{"title":"Smart voting","authors":"Bhuvanapriya R., Rozil Banu S., Sivapriya P., Kalaiselvi V.K.G.","doi":"10.1109/iccct2.2017.7972261","DOIUrl":"https://doi.org/10.1109/iccct2.2017.7972261","url":null,"abstract":"The main objective of the democracy is “vote” by which the people can elect the candidates for forming an efficient government to satisfy their needs and requests such that their standard living can be improved. In developing countries like “INDIA” the election commission follows manual voting mechanism which is done by electronic voting machine. This machine is placed in the poll booth centre and is monitored by higher officials. due to some illegal activities the polling centre are misused and people's vote to right has been denied. This seldom occurs in rural areas as well as in urban cities because the educated people are not interested in casting their votes to candidates who represent their respective areas. To ensure 100% voting automation came into play. But this automated system have been approved only on some developed countries since security have not been ensured to a large extent. Our main aim of the proposed system is to develop a compatible voting machine with high security. The proposed system is mainly designed for our country. It has three phases. First the details of the persons who are above 18years are extracted from aadhar card database since it had became mandatory in present scenario. Automatically a new voter id with necessary details will be created and an intimation will be given to the persons through their e-mail. At the time of voting, the user can specify their id and password. To ensure more security, finger prints of the voter is used as the main authentication resource. Since the finger pattern of each human being is different, the voter can be easily authenticated. The system allow the voter to vote through his fingerprint. Finger print is used to uniquely identify the user. The finger print minutiae features are different for each human being. Finger print is used as a authentication of the voters. As soon as they cast their vote, their voter id and other details will be erased automatically and the aadhar card details which they used will be tracked and will be locked to access. This is done to preserve the security. When people cast their vote the results will be updated automatically and on the same day of election, the results will also be published. Also our proposed system supports the online voting too.","PeriodicalId":445567,"journal":{"name":"2017 2nd International Conference on Computing and Communications Technologies (ICCCT)","volume":"110 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130783675","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-02-01DOI: 10.1109/ICCCT2.2017.7972257
Ila Chandrakar
In the ongoing political battle emerging out of the demonetization of currency notes in India, the ruling party and oppositions are ostensibly defending the interests of the poor. Some politicians are relying on anecdotal evidence to advocate the difficulties being faced by the common man. However, using the large and real sample data from Reserve Bank of India (RBI) and careful analysis for different income categories of people, we infer that the politicians advocating the difficulties faced by the common man are being disingenuous in pushing their claims for political gains. Further, the observation indicates that the long queues seen at banks and post offices is from three sections of the population: (i) the richer folks, who want to exchange their honestly earned savings for new currency, (ii) people who are acting as agents for the dishonest, and (iii) people who are in the category of below poverty line (BPL). This work proposes prediction scheme using Bayesian network to predict the outcome of demonetization, considering several dependencies. The proposed scheme is compared with other prediction approaches. The work reveals that the effect of demonetization of ₹ 500 and ₹ 1000 currency has largely affected BPL population, than the other categories. We further argue that this problem could have reduced the pains of all the sections of the society (e.g, printing ₹ 50 and ₹ 100 notes in plenty) with better planning and accurate predictions by the Government.
{"title":"Analysis of the effects of currency demonetization in India using Bayesian prediction","authors":"Ila Chandrakar","doi":"10.1109/ICCCT2.2017.7972257","DOIUrl":"https://doi.org/10.1109/ICCCT2.2017.7972257","url":null,"abstract":"In the ongoing political battle emerging out of the demonetization of currency notes in India, the ruling party and oppositions are ostensibly defending the interests of the poor. Some politicians are relying on anecdotal evidence to advocate the difficulties being faced by the common man. However, using the large and real sample data from Reserve Bank of India (RBI) and careful analysis for different income categories of people, we infer that the politicians advocating the difficulties faced by the common man are being disingenuous in pushing their claims for political gains. Further, the observation indicates that the long queues seen at banks and post offices is from three sections of the population: (i) the richer folks, who want to exchange their honestly earned savings for new currency, (ii) people who are acting as agents for the dishonest, and (iii) people who are in the category of below poverty line (BPL). This work proposes prediction scheme using Bayesian network to predict the outcome of demonetization, considering several dependencies. The proposed scheme is compared with other prediction approaches. The work reveals that the effect of demonetization of ₹ 500 and ₹ 1000 currency has largely affected BPL population, than the other categories. We further argue that this problem could have reduced the pains of all the sections of the society (e.g, printing ₹ 50 and ₹ 100 notes in plenty) with better planning and accurate predictions by the Government.","PeriodicalId":445567,"journal":{"name":"2017 2nd International Conference on Computing and Communications Technologies (ICCCT)","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123678985","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-02-01DOI: 10.1109/ICCCT2.2017.7972277
K. B, S. Raghavendran, K. S., S. P, V. Kalaiselvi
Trash Collection and management in residential locality is the basic considerations referred to in Smart Cities. The concept of trash collection in India is quite tedious. For efficient trash collection, we use the concept of Internet of Things (IOT) which acts as a backbone Technology. Surveillance systems can be used to improve Quality of Service in Trash collection. “This paper proposes an advanced Trash collection system with smart bins that alerts the authorised collector by sending alert messages for efficient Trash collection in Cities.” The system incorporates a data sharing model by using cloud to establish connection between truck drivers, corporation and trash cans to collect and gather waste in a profitable way. The system brings in the way of optimized way to collect things and maintain a clean and green environment.
{"title":"Internet of Bins: Trash Management in India","authors":"K. B, S. Raghavendran, K. S., S. P, V. Kalaiselvi","doi":"10.1109/ICCCT2.2017.7972277","DOIUrl":"https://doi.org/10.1109/ICCCT2.2017.7972277","url":null,"abstract":"Trash Collection and management in residential locality is the basic considerations referred to in Smart Cities. The concept of trash collection in India is quite tedious. For efficient trash collection, we use the concept of Internet of Things (IOT) which acts as a backbone Technology. Surveillance systems can be used to improve Quality of Service in Trash collection. “This paper proposes an advanced Trash collection system with smart bins that alerts the authorised collector by sending alert messages for efficient Trash collection in Cities.” The system incorporates a data sharing model by using cloud to establish connection between truck drivers, corporation and trash cans to collect and gather waste in a profitable way. The system brings in the way of optimized way to collect things and maintain a clean and green environment.","PeriodicalId":445567,"journal":{"name":"2017 2nd International Conference on Computing and Communications Technologies (ICCCT)","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127830532","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-02-01DOI: 10.1109/ICCCT2.2017.7972259
E. H. Shaik, N. Rangaswamy
All-optical photonic crystal based half adder is proposed using T-shaped waveguides with out of phase inputs. T-shaped waveguides at the input section act as light beam splitters to provide input to the T-shaped waveguides at the output section which acts as power combiners according to the input phase. A separate 180° phase shifter is designed and used at the output section of carry to provide in phase inputs. The proposed structure is resulted with the contrast ratio of 10.95 dB and 4.32 dB at sum and carry outputs, at a bit rate above 1 Tbps.
{"title":"Implementation of photonic crystal based all-optical half adder using T-shaped waveguides","authors":"E. H. Shaik, N. Rangaswamy","doi":"10.1109/ICCCT2.2017.7972259","DOIUrl":"https://doi.org/10.1109/ICCCT2.2017.7972259","url":null,"abstract":"All-optical photonic crystal based half adder is proposed using T-shaped waveguides with out of phase inputs. T-shaped waveguides at the input section act as light beam splitters to provide input to the T-shaped waveguides at the output section which acts as power combiners according to the input phase. A separate 180° phase shifter is designed and used at the output section of carry to provide in phase inputs. The proposed structure is resulted with the contrast ratio of 10.95 dB and 4.32 dB at sum and carry outputs, at a bit rate above 1 Tbps.","PeriodicalId":445567,"journal":{"name":"2017 2nd International Conference on Computing and Communications Technologies (ICCCT)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115389417","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-02-01DOI: 10.1109/ICCCT2.2017.7972305
R. Pari, M. Sandhya, S. Shankar
As per the reports published by World Health Organization (WHO) in November, 2012, every year more than 15 million babies are born preterm and this number is rising [1]. Preterm labor is the major cause of neonatal deaths. Every year, pre term birth (PTB) complications leads to the death of almost 1 million babies [2][3]. Predicting the preterm labor well in advance can reduce the neonatal death considerably. There are some commonly attributed risk factors associated with preterm birth [4][5]. 33% of the women who deliver their babies prematurely have one or more of these risk factors. We propose to predict PTB by analyzing the historical data of patients who had one or more of the above risk factors. In addition to this, historic data of the patients who did not have any of the above risk factors but had PTB is also analyzed. Electrohysterogram (EHG) is the most commonly used clinical procedure which can reveal few indicators of preterm labor [6]. We analyze the EHG signals to predict the pre term labor by applying Feature Extraction coupled with semi-supervised learning (SSL). Predicting the preterm labor helps the health care professionals to make decisions about the treatment [7]. Hence the expectant mother undergoes minimal or no complications of preterm labor. On the other hand it also helps to avoid unnecessary hospitalization and treatment for women who are having a false labor pain.
{"title":"Level prediction of preterm birth using risk factor analysis and electrohysterogram signal classification","authors":"R. Pari, M. Sandhya, S. Shankar","doi":"10.1109/ICCCT2.2017.7972305","DOIUrl":"https://doi.org/10.1109/ICCCT2.2017.7972305","url":null,"abstract":"As per the reports published by World Health Organization (WHO) in November, 2012, every year more than 15 million babies are born preterm and this number is rising [1]. Preterm labor is the major cause of neonatal deaths. Every year, pre term birth (PTB) complications leads to the death of almost 1 million babies [2][3]. Predicting the preterm labor well in advance can reduce the neonatal death considerably. There are some commonly attributed risk factors associated with preterm birth [4][5]. 33% of the women who deliver their babies prematurely have one or more of these risk factors. We propose to predict PTB by analyzing the historical data of patients who had one or more of the above risk factors. In addition to this, historic data of the patients who did not have any of the above risk factors but had PTB is also analyzed. Electrohysterogram (EHG) is the most commonly used clinical procedure which can reveal few indicators of preterm labor [6]. We analyze the EHG signals to predict the pre term labor by applying Feature Extraction coupled with semi-supervised learning (SSL). Predicting the preterm labor helps the health care professionals to make decisions about the treatment [7]. Hence the expectant mother undergoes minimal or no complications of preterm labor. On the other hand it also helps to avoid unnecessary hospitalization and treatment for women who are having a false labor pain.","PeriodicalId":445567,"journal":{"name":"2017 2nd International Conference on Computing and Communications Technologies (ICCCT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130759599","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-02-01DOI: 10.1109/ICCCT2.2017.7972246
N. Sumathi, T. Sheela
Now days customer expect the company's business how to listen, respond and suggest services through social network. Based on the customer engagement of social channels is approximately nine times faster than social network. The customer will expect banks to make use of social channels. Approximately two billion people using social media around world, and engage the customer on the social channels in banks. In order to improve the product and service development, marketing, business performance and risk management, banks can take out key insights that will enable on the social media. By analyzing the huge volumes of information available on social media is to deliver quicker and more efficient customer service and customized financial advice. Bank needs the customer, to build the social media strategies, in order to drive reliability, revenue and success is all about the customer experience.
{"title":"An empirical study on analyzing the distortion detection on OSN using NLP & SA in banking institution","authors":"N. Sumathi, T. Sheela","doi":"10.1109/ICCCT2.2017.7972246","DOIUrl":"https://doi.org/10.1109/ICCCT2.2017.7972246","url":null,"abstract":"Now days customer expect the company's business how to listen, respond and suggest services through social network. Based on the customer engagement of social channels is approximately nine times faster than social network. The customer will expect banks to make use of social channels. Approximately two billion people using social media around world, and engage the customer on the social channels in banks. In order to improve the product and service development, marketing, business performance and risk management, banks can take out key insights that will enable on the social media. By analyzing the huge volumes of information available on social media is to deliver quicker and more efficient customer service and customized financial advice. Bank needs the customer, to build the social media strategies, in order to drive reliability, revenue and success is all about the customer experience.","PeriodicalId":445567,"journal":{"name":"2017 2nd International Conference on Computing and Communications Technologies (ICCCT)","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128208174","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-02-01DOI: 10.1109/ICCCT2.2017.7972309
M. SureshKumar, P. Varalakshmi
In this modern world the task of users various low level systems thus appropriate services to the requested users. They help in composition of applications. It is important to deliver is greatly reduced by various web service providing the user a valid service. The role of web services in integrating and building various loosely-coupled systems is tremendously attracting the attention of various researches in the field of web service composition. Several algorithms are widely used for the process of web service selection. This paper deals with the genetic algorithms for service selection with QoS levels according to application requirements. An optimal solution is dynamically generated by the service oriented graph as soon as the request is given. To perform specific function, multiple service providers provides a web service collection which corresponds to each SBr. Rather than using a local service selection strategy it is better to use Genetic Algorithm(GA) in this paper to achieve better performance. By using proper GA parameters we can achieve the global optimal solution. QoS is thus helpful in finding the required run path for the web services.
{"title":"A heuristic approach for web service selection with cost optimization","authors":"M. SureshKumar, P. Varalakshmi","doi":"10.1109/ICCCT2.2017.7972309","DOIUrl":"https://doi.org/10.1109/ICCCT2.2017.7972309","url":null,"abstract":"In this modern world the task of users various low level systems thus appropriate services to the requested users. They help in composition of applications. It is important to deliver is greatly reduced by various web service providing the user a valid service. The role of web services in integrating and building various loosely-coupled systems is tremendously attracting the attention of various researches in the field of web service composition. Several algorithms are widely used for the process of web service selection. This paper deals with the genetic algorithms for service selection with QoS levels according to application requirements. An optimal solution is dynamically generated by the service oriented graph as soon as the request is given. To perform specific function, multiple service providers provides a web service collection which corresponds to each SBr. Rather than using a local service selection strategy it is better to use Genetic Algorithm(GA) in this paper to achieve better performance. By using proper GA parameters we can achieve the global optimal solution. QoS is thus helpful in finding the required run path for the web services.","PeriodicalId":445567,"journal":{"name":"2017 2nd International Conference on Computing and Communications Technologies (ICCCT)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125988122","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-02-01DOI: 10.1109/ICCCT2.2017.7972303
M. Jain, N. Kaushik, Kayalvizhi Jayavel
Automation is the new trend in technology and in the common world. The true essence of the digital control of the energy and the automation of appliance usage is emerged when we use it to solve the big energy crisis problem. The use of energy by commercial sector in countries are growing rapidly and so is the wastage. 20% of the total energy of U.S. is consumed by the commercial sector. The 30% of the usage by commercial building is inefficient and unnecessary. [1] The automation by efficient usage can help in saving 10% of this wastage which results in the collective saving of about 40 Billion [2]. The figures tell us that the energy efficiency can save a huge cost. The automation and energy efficiency analysis is the key to it. This paper presents the automation techniques and a module that works for a room automation and ease of access to appliances with digital control. Any product or project module is not good enough if it is not easily accessible, hence, the ease of access plays an important role.
{"title":"Building automation and energy control using IoT - Smart campus","authors":"M. Jain, N. Kaushik, Kayalvizhi Jayavel","doi":"10.1109/ICCCT2.2017.7972303","DOIUrl":"https://doi.org/10.1109/ICCCT2.2017.7972303","url":null,"abstract":"Automation is the new trend in technology and in the common world. The true essence of the digital control of the energy and the automation of appliance usage is emerged when we use it to solve the big energy crisis problem. The use of energy by commercial sector in countries are growing rapidly and so is the wastage. 20% of the total energy of U.S. is consumed by the commercial sector. The 30% of the usage by commercial building is inefficient and unnecessary. [1] The automation by efficient usage can help in saving 10% of this wastage which results in the collective saving of about 40 Billion [2]. The figures tell us that the energy efficiency can save a huge cost. The automation and energy efficiency analysis is the key to it. This paper presents the automation techniques and a module that works for a room automation and ease of access to appliances with digital control. Any product or project module is not good enough if it is not easily accessible, hence, the ease of access plays an important role.","PeriodicalId":445567,"journal":{"name":"2017 2nd International Conference on Computing and Communications Technologies (ICCCT)","volume":"10 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123529370","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-02-01DOI: 10.1109/ICCCT2.2017.7972239
N. Muralidhara, R. B., R. Biradar, Jayaramaiah G.V
Digital Pulse compression is a technique to achieve better range resolution that of corresponding short pulse by transmitted power of a reasonably long pulse. Compare to other radar waveform codes, Polyphase codes have the ability to achieve better side lobe levels without applying weighting functions. More importantly, Polyphase wave forms have the advantages of low main lobe width, high peak side lobe ratio and better Doppler tolerance, a vital parameter to extract the target's velocity. In this paper, the authors would like to analyze Digital Pulse Compression technique for radar application, using Polyphase codes and summarize the comparison between different Polyphase in terms of main lobe width, side lobe reduction, Doppler tolerance and analyze the effect of pre-compression band-limiting. The advantages of Polyphase codes and waveform design criteria for the S-band Radar application is also discussed in this paper.
{"title":"Designing Polyphase code for Digital Pulse Compression for surveillance Radar","authors":"N. Muralidhara, R. B., R. Biradar, Jayaramaiah G.V","doi":"10.1109/ICCCT2.2017.7972239","DOIUrl":"https://doi.org/10.1109/ICCCT2.2017.7972239","url":null,"abstract":"Digital Pulse compression is a technique to achieve better range resolution that of corresponding short pulse by transmitted power of a reasonably long pulse. Compare to other radar waveform codes, Polyphase codes have the ability to achieve better side lobe levels without applying weighting functions. More importantly, Polyphase wave forms have the advantages of low main lobe width, high peak side lobe ratio and better Doppler tolerance, a vital parameter to extract the target's velocity. In this paper, the authors would like to analyze Digital Pulse Compression technique for radar application, using Polyphase codes and summarize the comparison between different Polyphase in terms of main lobe width, side lobe reduction, Doppler tolerance and analyze the effect of pre-compression band-limiting. The advantages of Polyphase codes and waveform design criteria for the S-band Radar application is also discussed in this paper.","PeriodicalId":445567,"journal":{"name":"2017 2nd International Conference on Computing and Communications Technologies (ICCCT)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121611991","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}