Pub Date : 2017-07-01DOI: 10.1109/COMPTELIX.2017.8004015
Rajnesh Kumar Yadav, A. G, S. Agrawal
Installation of photovoltaic cell has been increasing day by day in industries and houses due to the increase in cost of power. But the major concern for the increase in future usage of the photovoltaic cell depends on the improvement in efficiency. Accumulation of soil and debris in the photo voltaic cell from the environment reduces the efficiency at the considerable level. In this paper, increase in efficiency can be achieved by removing the soil and dust accumulated in the surface of the photovoltaic cell using wiper which has been operated with servomotor, governed by Arduino microcontroller.
{"title":"Efficiency improvement of solar array by mitigating soil loss using Arduino","authors":"Rajnesh Kumar Yadav, A. G, S. Agrawal","doi":"10.1109/COMPTELIX.2017.8004015","DOIUrl":"https://doi.org/10.1109/COMPTELIX.2017.8004015","url":null,"abstract":"Installation of photovoltaic cell has been increasing day by day in industries and houses due to the increase in cost of power. But the major concern for the increase in future usage of the photovoltaic cell depends on the improvement in efficiency. Accumulation of soil and debris in the photo voltaic cell from the environment reduces the efficiency at the considerable level. In this paper, increase in efficiency can be achieved by removing the soil and dust accumulated in the surface of the photovoltaic cell using wiper which has been operated with servomotor, governed by Arduino microcontroller.","PeriodicalId":6917,"journal":{"name":"2017 International Conference on Computer, Communications and Electronics (Comptelix)","volume":"44 1","pages":"467-471"},"PeriodicalIF":0.0,"publicationDate":"2017-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86851638","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-07-01DOI: 10.1109/COMPTELIX.2017.8004025
M. K. Gupta, G. Singh
In the present work, we have analyzed the effects of dicode coding in a passive optical network based on both wavelength and time division multiplexing (WDM-TDM-PON). By numerical analysis, we observed that network using dicode coding is more tolerant to Group Velocity Dispersion (GVD) as compared to traditional Non-return to zero - on-offkeying(NRZOOK) coding. Dispersion degrades the sensitivity of NRZ receiver by 5.5 dB hence limiting the number of users and channel length. With the observations from analysis and results, we suggest the use of Dicode coding to double the number of usersand increase the length of the network by 20percentin respect to NRZ.
{"title":"Group Velocity Dispersion tolerant WDM TDM Passive Optical Networks","authors":"M. K. Gupta, G. Singh","doi":"10.1109/COMPTELIX.2017.8004025","DOIUrl":"https://doi.org/10.1109/COMPTELIX.2017.8004025","url":null,"abstract":"In the present work, we have analyzed the effects of dicode coding in a passive optical network based on both wavelength and time division multiplexing (WDM-TDM-PON). By numerical analysis, we observed that network using dicode coding is more tolerant to Group Velocity Dispersion (GVD) as compared to traditional Non-return to zero - on-offkeying(NRZOOK) coding. Dispersion degrades the sensitivity of NRZ receiver by 5.5 dB hence limiting the number of users and channel length. With the observations from analysis and results, we suggest the use of Dicode coding to double the number of usersand increase the length of the network by 20percentin respect to NRZ.","PeriodicalId":6917,"journal":{"name":"2017 International Conference on Computer, Communications and Electronics (Comptelix)","volume":"9 1","pages":"521-526"},"PeriodicalIF":0.0,"publicationDate":"2017-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89028416","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-07-01DOI: 10.1109/COMPTELIX.2017.8004026
Prerna Gupta, G. Parmar
In this era of internet, protection of digital images has become an important concern. Digital image watermarking is a scheme that has been developed to protect confidential digital images from illegal copy and manipulations. There are various methods of watermarking but to achieve good imperceptibility and robustness, a combined image watermarking algorithm based on Integer Wavelet Transform (IWT) and Singular Value Decomposition (SVD) has been developed here. Another aim of this paper is to compare the performance of IWT-SVD algorithm at different scaling factors with DWT-SVD technique. The experimental results have been shared for both the techniques and different evaluation parameters such as; Peak Signal to Noise Ratio (PSNR) and Normalized Cross Correlation (NCC) have been calculated & compared in tabular forms.
{"title":"Image watermarking using IWT-SVD and its comparative analysis with DWT-SVD","authors":"Prerna Gupta, G. Parmar","doi":"10.1109/COMPTELIX.2017.8004026","DOIUrl":"https://doi.org/10.1109/COMPTELIX.2017.8004026","url":null,"abstract":"In this era of internet, protection of digital images has become an important concern. Digital image watermarking is a scheme that has been developed to protect confidential digital images from illegal copy and manipulations. There are various methods of watermarking but to achieve good imperceptibility and robustness, a combined image watermarking algorithm based on Integer Wavelet Transform (IWT) and Singular Value Decomposition (SVD) has been developed here. Another aim of this paper is to compare the performance of IWT-SVD algorithm at different scaling factors with DWT-SVD technique. The experimental results have been shared for both the techniques and different evaluation parameters such as; Peak Signal to Noise Ratio (PSNR) and Normalized Cross Correlation (NCC) have been calculated & compared in tabular forms.","PeriodicalId":6917,"journal":{"name":"2017 International Conference on Computer, Communications and Electronics (Comptelix)","volume":"09 1","pages":"527-531"},"PeriodicalIF":0.0,"publicationDate":"2017-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85983938","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-07-01DOI: 10.1109/COMPTELIX.2017.8003960
Akash Mewara, G. Parmar
The Differential Evolution (DE) algorithm has been employed for tuning the parameters of the PID controllers existing into the load frequency control (LFC) system of standard interconnected thermal power system by considering the minimization of three objective functions based on the ITAE, damping ratio of dominant eigen values and settling times of frequency and tie line power deviations. The disturbance of 0.1 p.u. step load change is considered in to the area-1 at time t=0 second by keeping no change in area-2 and the system performance has been evaluated in terms of damping ratio, ITAE value, the dynamic responses and time domain specifications. The system performance with PID controllers tuned using DE, are also compared with the performance of the same system optimized by the different techniques in literature such as: BFOA tuned PI controllers, GA tuned PI controllers and DE tuned PI controllers. In the present work, the results show that the better dynamic responses have been obtained by the proposed DE tuned PID controllers with less settling times, smaller overshoots, good damping behavior for the oscillations and less ITAE value as compared to some other techniques mentioned above.
{"title":"Comparison of DE optimized PID controllers for AGC of interconnected power system","authors":"Akash Mewara, G. Parmar","doi":"10.1109/COMPTELIX.2017.8003960","DOIUrl":"https://doi.org/10.1109/COMPTELIX.2017.8003960","url":null,"abstract":"The Differential Evolution (DE) algorithm has been employed for tuning the parameters of the PID controllers existing into the load frequency control (LFC) system of standard interconnected thermal power system by considering the minimization of three objective functions based on the ITAE, damping ratio of dominant eigen values and settling times of frequency and tie line power deviations. The disturbance of 0.1 p.u. step load change is considered in to the area-1 at time t=0 second by keeping no change in area-2 and the system performance has been evaluated in terms of damping ratio, ITAE value, the dynamic responses and time domain specifications. The system performance with PID controllers tuned using DE, are also compared with the performance of the same system optimized by the different techniques in literature such as: BFOA tuned PI controllers, GA tuned PI controllers and DE tuned PI controllers. In the present work, the results show that the better dynamic responses have been obtained by the proposed DE tuned PID controllers with less settling times, smaller overshoots, good damping behavior for the oscillations and less ITAE value as compared to some other techniques mentioned above.","PeriodicalId":6917,"journal":{"name":"2017 International Conference on Computer, Communications and Electronics (Comptelix)","volume":"60 1","pages":"178-182"},"PeriodicalIF":0.0,"publicationDate":"2017-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88734137","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-07-01DOI: 10.1109/COMPTELIX.2017.8004002
Nida Hakak, Mohsin Mohd, Mahira Kirmani, Mudasir Mohd
Emotions form a very important and basic aspect of our lives. Whatever we do, whatever we say, somehow does reflect some of our emotions, though may not be directly. To understand the very fundamental behavior of a human, we need to analyze these emotions through some emotional data, also called, the affect data. This data can be text, voice, facial expressions etc. Using this emotional data for analyzing the emotions also forms an interdisciplinary field, called Affective Computing. Computation of emotions is a very challenging task, much work has been done but many more increments are also possible. With the advent of social networking sites, many people tend to get attracted towards analyzing this very text available on these various sites. Analyzing this data over the Internet means we are spanning across the whole continent, going through all the cultures and communities across. This paper summarizes the previous works done in the field of textual emotion analysis based on various emotional models and computational approaches used.
{"title":"Emotion analysis: A survey","authors":"Nida Hakak, Mohsin Mohd, Mahira Kirmani, Mudasir Mohd","doi":"10.1109/COMPTELIX.2017.8004002","DOIUrl":"https://doi.org/10.1109/COMPTELIX.2017.8004002","url":null,"abstract":"Emotions form a very important and basic aspect of our lives. Whatever we do, whatever we say, somehow does reflect some of our emotions, though may not be directly. To understand the very fundamental behavior of a human, we need to analyze these emotions through some emotional data, also called, the affect data. This data can be text, voice, facial expressions etc. Using this emotional data for analyzing the emotions also forms an interdisciplinary field, called Affective Computing. Computation of emotions is a very challenging task, much work has been done but many more increments are also possible. With the advent of social networking sites, many people tend to get attracted towards analyzing this very text available on these various sites. Analyzing this data over the Internet means we are spanning across the whole continent, going through all the cultures and communities across. This paper summarizes the previous works done in the field of textual emotion analysis based on various emotional models and computational approaches used.","PeriodicalId":6917,"journal":{"name":"2017 International Conference on Computer, Communications and Electronics (Comptelix)","volume":"37 1","pages":"397-402"},"PeriodicalIF":0.0,"publicationDate":"2017-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81302271","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-07-01DOI: 10.1109/COMPTELIX.2017.8004047
S. Jain, N. Chaturvedi, S. Gurunarayanan
Using FinFET for designing of SRAM cells has shown a great deal of advantages over planar bulk devices due to the additional control on the gates and due to fully depleted behavior. The improvements have been noted in sub-threshold slope, drive currents, short-channel effects and mismatches. As the memories become denser, the stability of the SRAM cells becomes a point of great concern. This calls for the need of assist circuitry for improving the reliability and stability of the cells. In this work, a write assist technique is discussed to improve the stability of the device. This design decreases the WLCRIT drastically and reduces the write delay of the cell. The simulations have been carried out on HSPICE with 32 nm PTM libraries for FinFET.
{"title":"Design and analysis of 6T SRAM cell with NBL write assist technique using FinFET","authors":"S. Jain, N. Chaturvedi, S. Gurunarayanan","doi":"10.1109/COMPTELIX.2017.8004047","DOIUrl":"https://doi.org/10.1109/COMPTELIX.2017.8004047","url":null,"abstract":"Using FinFET for designing of SRAM cells has shown a great deal of advantages over planar bulk devices due to the additional control on the gates and due to fully depleted behavior. The improvements have been noted in sub-threshold slope, drive currents, short-channel effects and mismatches. As the memories become denser, the stability of the SRAM cells becomes a point of great concern. This calls for the need of assist circuitry for improving the reliability and stability of the cells. In this work, a write assist technique is discussed to improve the stability of the device. This design decreases the WLCRIT drastically and reduces the write delay of the cell. The simulations have been carried out on HSPICE with 32 nm PTM libraries for FinFET.","PeriodicalId":6917,"journal":{"name":"2017 International Conference on Computer, Communications and Electronics (Comptelix)","volume":"44 1","pages":"639-644"},"PeriodicalIF":0.0,"publicationDate":"2017-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82466858","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-07-01DOI: 10.1109/COMPTELIX.2017.8004032
Gaurav Meena, R. Choudhary
In the Area of Security, Intrusion Detection System (IDS) form an individual trailing and plays an essential role in information Security. As the usability of the internet among the users in a wide area is increasing day by day so as the importance of security and to keep the system aware of the malicious activities is also increasing. It has the following limitations on low detection rate, high false alarm rate and so on which is been indicated by the traditional Intrusion Detection System. A performance of the classifier is based on the necessity of the terms of its effectiveness, and it is also concerned with the number of features to be examined by the IDS should be improved. In this, J48 is been performed on the hybrid IDS and is applied using J48 Decision Tree algorithm, J48 Decision Tree is used for the feature selection and Naive Bayes Algorithm. Basically Intrusion detection systems (IDSs) is been used on the basis of two fundamental approaches first the recognition of anomalous activities as it generally occurs on the turns from usual or unusual behavior and second misuse detection by observing unauthorized “signatures” of those recognized malicious assaults and classification vulnerabilities. Anomaly or the anonymous (behavior-based) IDSs presume the difference of normal behavior beneath attacks and achieve abnormal activities evaluated and recognized with predefined system or user behavior reference model. The main focus of this survey is on WEKA (Waikato Environment for Knowledge Analysis) Tool and its various algorithms of classification used for detecting and analyzing the various intrusions. Lastly, In this survey, we lead to elaborate the mostly used dataset in information security research KDDCUP and NSL KDD and its various components.
在安全领域,入侵检测系统(IDS)是一个独立的分支,在信息安全中起着至关重要的作用。随着互联网在广大用户中的可用性日益增加,安全的重要性和保持系统对恶意活动的意识也日益增加。传统的入侵检测系统存在检测率低、虚警率高等缺点。分类器的性能取决于其有效性的必要性,也与IDS要检查的特征的数量有关。其中,在混合IDS上进行J48,并使用J48决策树算法,J48决策树用于特征选择和朴素贝叶斯算法。基本上,入侵检测系统(ids)的使用基于两种基本方法:一是识别异常活动,因为它通常发生在正常或异常行为的转变中;二是通过观察被识别的恶意攻击和分类漏洞的未经授权的“签名”来进行误用检测。异常或匿名(基于行为的)ids假定攻击下正常行为的差异,通过预定义的系统或用户行为参考模型来评估和识别异常活动。本次调查的主要重点是WEKA (Waikato Environment for Knowledge Analysis)工具及其用于检测和分析各种入侵的各种分类算法。最后,在本调查中,我们详细阐述了信息安全研究中最常用的数据集KDDCUP和NSL KDD及其各个组成部分。
{"title":"A review paper on IDS classification using KDD 99 and NSL KDD dataset in WEKA","authors":"Gaurav Meena, R. Choudhary","doi":"10.1109/COMPTELIX.2017.8004032","DOIUrl":"https://doi.org/10.1109/COMPTELIX.2017.8004032","url":null,"abstract":"In the Area of Security, Intrusion Detection System (IDS) form an individual trailing and plays an essential role in information Security. As the usability of the internet among the users in a wide area is increasing day by day so as the importance of security and to keep the system aware of the malicious activities is also increasing. It has the following limitations on low detection rate, high false alarm rate and so on which is been indicated by the traditional Intrusion Detection System. A performance of the classifier is based on the necessity of the terms of its effectiveness, and it is also concerned with the number of features to be examined by the IDS should be improved. In this, J48 is been performed on the hybrid IDS and is applied using J48 Decision Tree algorithm, J48 Decision Tree is used for the feature selection and Naive Bayes Algorithm. Basically Intrusion detection systems (IDSs) is been used on the basis of two fundamental approaches first the recognition of anomalous activities as it generally occurs on the turns from usual or unusual behavior and second misuse detection by observing unauthorized “signatures” of those recognized malicious assaults and classification vulnerabilities. Anomaly or the anonymous (behavior-based) IDSs presume the difference of normal behavior beneath attacks and achieve abnormal activities evaluated and recognized with predefined system or user behavior reference model. The main focus of this survey is on WEKA (Waikato Environment for Knowledge Analysis) Tool and its various algorithms of classification used for detecting and analyzing the various intrusions. Lastly, In this survey, we lead to elaborate the mostly used dataset in information security research KDDCUP and NSL KDD and its various components.","PeriodicalId":6917,"journal":{"name":"2017 International Conference on Computer, Communications and Electronics (Comptelix)","volume":"26 1","pages":"553-558"},"PeriodicalIF":0.0,"publicationDate":"2017-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82836165","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-07-01DOI: 10.1109/COMPTELIX.2017.8003997
Arti M.K., Shimpee Seema
The problem of high-rate space-time block code (STBC) design and transmission is studied in a large multiple-input multiple-output (MIMO) system in Rayleigh fading environment. One attractive feature of large MIMO system is that a huge amount of data can be transmitted from transmitter to the receiver/multiple users. In practical systems, channel state information (CSI) is not available for decoding of the data, therefore, CSI needs to be estimated by using pilot symbols. It is shown in literature that very large number of time-slots are required for pilot transmission in large MIMO systems, it will lead to a very less number of time-slots for data transmission. In this case, a high-rate STBC is a possible way to transmit large amount of data in practical large MIMO systems. We propose a method to design a high-rate STBC by inserting the orthogonal STBCs of small dimensions and good rate. The concept of null space is used for decoding of transmitted data. The analytical performance of the proposed scheme is discussed in terms of symbol error rate.
{"title":"High-rate code design and transmission in large MIMO systems","authors":"Arti M.K., Shimpee Seema","doi":"10.1109/COMPTELIX.2017.8003997","DOIUrl":"https://doi.org/10.1109/COMPTELIX.2017.8003997","url":null,"abstract":"The problem of high-rate space-time block code (STBC) design and transmission is studied in a large multiple-input multiple-output (MIMO) system in Rayleigh fading environment. One attractive feature of large MIMO system is that a huge amount of data can be transmitted from transmitter to the receiver/multiple users. In practical systems, channel state information (CSI) is not available for decoding of the data, therefore, CSI needs to be estimated by using pilot symbols. It is shown in literature that very large number of time-slots are required for pilot transmission in large MIMO systems, it will lead to a very less number of time-slots for data transmission. In this case, a high-rate STBC is a possible way to transmit large amount of data in practical large MIMO systems. We propose a method to design a high-rate STBC by inserting the orthogonal STBCs of small dimensions and good rate. The concept of null space is used for decoding of transmitted data. The analytical performance of the proposed scheme is discussed in terms of symbol error rate.","PeriodicalId":6917,"journal":{"name":"2017 International Conference on Computer, Communications and Electronics (Comptelix)","volume":"33 5","pages":"373-378"},"PeriodicalIF":0.0,"publicationDate":"2017-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91479367","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-07-01DOI: 10.1109/COMPTELIX.2017.8003941
Seema Das, P. Patnaik, R. Jha
Any realistic model will have high complexity; in other words, it will require many state variables to be adequately described. The resulting complexity, i.e. number of first-order differential equations, is such that a simplification or model reduction will be needed in order to perform a simulation in an amount of time which is acceptable for the application at hand, or for the design of a low order controller which achieves desired objectives. Thus in all these cases reduced-order models are needed. The motivation for appropriate MOR is to obtain an accurate model of smaller order which can be easily simulated and implemented in hard ware with ease saving effort, cost and time. This paper proposes a numerically efficient model order reduction method using evolutionary technique, Genetic Algorithm. GA method is based on the minimization of the Integral Squared Error (ISE) between the transient responses of original higher order model and the reduced order model pertaining to a unit step input. This ISE is very useful in performance evaluation. The simulation result shows the effectiveness of the proposed scheme to obtain the stable 1st, 2nd and 3rd order reduced stable model from a stable 4th order original system with minimum error bound.
{"title":"Model order reduction of high order LTI system using Genetic Algorithm","authors":"Seema Das, P. Patnaik, R. Jha","doi":"10.1109/COMPTELIX.2017.8003941","DOIUrl":"https://doi.org/10.1109/COMPTELIX.2017.8003941","url":null,"abstract":"Any realistic model will have high complexity; in other words, it will require many state variables to be adequately described. The resulting complexity, i.e. number of first-order differential equations, is such that a simplification or model reduction will be needed in order to perform a simulation in an amount of time which is acceptable for the application at hand, or for the design of a low order controller which achieves desired objectives. Thus in all these cases reduced-order models are needed. The motivation for appropriate MOR is to obtain an accurate model of smaller order which can be easily simulated and implemented in hard ware with ease saving effort, cost and time. This paper proposes a numerically efficient model order reduction method using evolutionary technique, Genetic Algorithm. GA method is based on the minimization of the Integral Squared Error (ISE) between the transient responses of original higher order model and the reduced order model pertaining to a unit step input. This ISE is very useful in performance evaluation. The simulation result shows the effectiveness of the proposed scheme to obtain the stable 1st, 2nd and 3rd order reduced stable model from a stable 4th order original system with minimum error bound.","PeriodicalId":6917,"journal":{"name":"2017 International Conference on Computer, Communications and Electronics (Comptelix)","volume":"9 1","pages":"73-77"},"PeriodicalIF":0.0,"publicationDate":"2017-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84807856","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-07-01DOI: 10.1109/COMPTELIX.2017.8003966
D. Noor, S. Yadav, S. Yadav
While we are moving towards a digitized era where everything is getting digital, then the transmission of the signal at the desired frequency range becomes a matter of apprehension. Signal transmission has affected by various propagation effects, path loss, interference etc. As is well acknowledged that Frequency selective surface is a filter which has a stable frequency response even though the electromagnetic waves to surface are fluctuated. A Bandpass FSS is proposed in this paper that has stable frequency response as the proposed structure symmetrical and insensitive towards polarization. The proposed structure contains a single sided FR4 substrate with dielectric constant 4.4mm, thickness 1.6mm tangential loss 0.025 and the dimension of the unit cell is 0.24 λ × 0.24λ. The structure consists of a square and two octagons that provide stable frequency response at 2.4GHz, 3.5GHz, and 5.5GHz. The simulated results shows good insertion loss in both TM and TE wave modes at various angles of incidence. Simulation is carried out in CST microwave studio that is based on FDTD method in frequency domain solver.
{"title":"A triple Bandpass Frequency selective surface for enhancement in the transmission of WiMax and WLAN application","authors":"D. Noor, S. Yadav, S. Yadav","doi":"10.1109/COMPTELIX.2017.8003966","DOIUrl":"https://doi.org/10.1109/COMPTELIX.2017.8003966","url":null,"abstract":"While we are moving towards a digitized era where everything is getting digital, then the transmission of the signal at the desired frequency range becomes a matter of apprehension. Signal transmission has affected by various propagation effects, path loss, interference etc. As is well acknowledged that Frequency selective surface is a filter which has a stable frequency response even though the electromagnetic waves to surface are fluctuated. A Bandpass FSS is proposed in this paper that has stable frequency response as the proposed structure symmetrical and insensitive towards polarization. The proposed structure contains a single sided FR4 substrate with dielectric constant 4.4mm, thickness 1.6mm tangential loss 0.025 and the dimension of the unit cell is 0.24 λ × 0.24λ. The structure consists of a square and two octagons that provide stable frequency response at 2.4GHz, 3.5GHz, and 5.5GHz. The simulated results shows good insertion loss in both TM and TE wave modes at various angles of incidence. Simulation is carried out in CST microwave studio that is based on FDTD method in frequency domain solver.","PeriodicalId":6917,"journal":{"name":"2017 International Conference on Computer, Communications and Electronics (Comptelix)","volume":"92 1","pages":"211-215"},"PeriodicalIF":0.0,"publicationDate":"2017-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85288469","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}