Results (1182)
Search Parameters:
Keyword: ULAMicrostrip Patch Antenna for Ultra-Wideband Applications
A new microstrip patch antenna for ultra-wideband applications is presented in this paper. The design and performance of the antenna component are discussed. The propounded antenna is mounted on a compact FR-4 substrate having dimensions 20 x 30 x 1.6 mm3 with relative permittivity εr=4.3. The rectangular patch antenna is slotted with two types; rectangular…
Read MoreEvaluation of IEEE 802.11n and IEEE 802.11p based on Vehicle to Vehicle Communications
Wireless communication opens up new avenues in the field of intelligent vehicle systems, including monitoring, guidance and warning applications. In order to determine more precisely the feasibility of using the 802.11n standard in vehicular communication systems, this paper describes a process for evaluating the propagation performance of the 802.11n and 802.11p standards. To do that,…
Read MoreA Novel Rule Based Technique to Detect Electricity Theft in India
It is high time to control and prevent power theft by manipulating the meter reading and tampering of the meter. It is possible to deal power theft by developing Advanced Metering Infrastructure (AMI) and smart grids. For most of the distribution companies, utility smart meters’ data is serving as wealthy source of information beyond billing.…
Read MoreBehavioral Analysis of Bitcoin Users on Illegal Transactions
Bitcoin is a popular crypto currency that is used as a mode of investment and a medium for trading goods and services. Anonymity, security and decentralization are significant features of Bitcoin. This creates several opportunities for criminals to involve in illegal and fraudulent activities. This research study aimed to automate the process of gaining the…
Read MoreRelational Databases Versus HBase: An Experimental Evaluation
Relational database management systems (RDBMS) have been imposed for more than three decades as a facto standard for data storage, management, and analysis. They have a good reputation by supporting ACID properties (Atomicity, Consistency, Isolation, and Durability) and by adopting the SQL language which has become a standardized language. However, despite their power, RDBMS have…
Read MoreComputer Security as an Engineering Practice: A System Engineering Discussion
We examine design principles from more than 20 years of experience in the implementation and protection of mission critical flight systems used by the Mission Design and Navigation Section at NASA’s Jet Propulsion Laboratory. Spacecraft navigation has rigorous requirements for completeness and accuracy, often under critical and uncompromising time pressure. Fault tolerant and robust design…
Read MoreHybrid Technique for Enhancing Underwater Image in blurry conditions
Enhancing underwater visualization using hybrid technique is generally employed into oceanic production. Through growing oceanic learning, undersea processing has drawn extra importance owing towards necessary task of picture towards attaining data. Although, suitable to reality of dust-like constituent and beam reduction, undersea descriptions continually experience small contrast and color alteration. In this paper, we estimate…
Read MoreAn Innovative EPC Architecture based on Not Only Stack for beyond 5G Mobile Networks
The traditional long-term evolved (LTE) network architecture faces major challenges due to the rapid development of mobile intelligent applications. Evolved packet core (EPC) network, as the core network of the LTE system, faces the same problem as well. In this paper, we propose an innovative EPC architecture, i.e., Not only stack (NOS)-EPC, in which we…
Read MoreEnabling the Edge – A method for dynamic virtualizable connections for 5G deployments
The telecommunications industry continues to move forward with plans for 5G service with rates including 6Gb/s followed by upgrade paths promising 20Gb/s. Despite advances in wireless technology associated with 5G roll-outs, there remains the problem of providing sufficient backhaul throughput and efficient handling of hand-off services within the relatively small projected cell boundaries that can…
Read MoreApplication of The Half-Sweep Egsor Iteration for Two-Point Boundary Value Problems of Fractional Order
The point of this study is to explore and elucidating the performance of the four-point Half-Sweep EGSOR (4HSEGSOR) iterative method to solve fractional two-point boundary value problems by using Caputo’s fractional operator and family of finite differences (FD) schemes. To apply the iterative methods, linear system needs to be constructed via the discretization process with…
Read MoreMultiple Social Metrics Based Routing Protocol in Opportunistic Mobile Social Networks
In Opportunistic Mobile social networks (OMSNs), the social characteristics and behavior of humans carrying mobile devices are exploited to improve information provision and data routing in the network. Social-based routing algorithms attempt to exploit users’ social features such as similarity, centrality and betweenness, singularly or combined, to select a suitable relay node among neighbors. However,…
Read MoreEducational Domain Management Knowledge Content Identification and Knowledge Updating Method, Based on Enterprise Management Information Interactions
The aim of this paper is to develop the educational domain management knowledge content identification and knowledge updating method, based on formal descriptions of enterprise management information interactions. This is very important because the progress of modern science leads to the emergence of new factual or conceptual knowledge. There is a need for proper methods…
Read MoreA Fuzzy PID-Based Cascade Control for Continuous Material Weighing Conveyor
This article presents a nonlinear model of the continuous weighing conveyor system as considering the delay time of material transport, and then given a novel two-loop control strategy based on PID combined with fuzzy logic: inner velocity control loop and outer mass flowrate control loop. Then, two designed controllers for the velocity and mass flowrate…
Read MoreDesign and Analysis of 32-bit Parallel Prefix Adders for Low Power VLSI Applications
The basic processes like addition, subtraction can be done using various types of binary adders with dissimilar addition times (delay), area and power consumption in any digital processing applications. To minimize the Power Delay Product (PDP) of Digital Signal Processing (DSP) processors is necessary for high performance in Very Large Scale Integration (VLSI) applications. In…
Read MoreA Systematic Mapping Study of Cloud, Fog, and Edge/Mobile Devices Management, Hierarchy Models and Business Models
Cloud computing is an exceptional paradigm, which is facilitating the developments and utilization of resources over the internet. Fog computing operates at the edge of the network saving bandwidth, by not sending all information to the cloud, while edge computing does processing of data at the edge of the cloud. Edge computing reduces the distance…
Read MoreLabVIEW Development for an Intelligent Management System of the Electrical Energy Free Market
Consumers of electrical energy have looked more closely to the energy consumption in last years due to the successive increase of the electricity bill. Nowadays it is possible to notice that many consumers have been looking for ways to reduce their consumption or the value of their electricity bill. Such a cost reduction is obtained…
Read MoreNovel CPW-fed UWB antenna for X-band applications
An ultra-wideband (UWB) printed antenna (PMA) powered by a compact coplanar waveguide (CPW) is featured. The propounded antenna is supposed to cover the UWB range from 7 GHz to 10 GHz, with return loss values below -10 dB in the whole frequency range, for X-band applications, often used for dense satellite communications. The 30 x…
Read MoreA Spectrum Sharing based Metering Infrastructure for Smart Grid Utilizing LTE and WiFi
In advanced metering infrastructure (AMI) of smart grid, WiFi is an appropriate choice for its bidirectional communication requirement to transmit data to the billing center. But, WiFi functions in the free spectrum bands and LTE also requires to use the same free bands for its network expansion being licensed spectrum is limited and expansive. LTE…
Read MoreCoupling of Local and Global Quantities by A Subproblem Finite Element Method – Application to Thin Region Models
A method for coupling of local and global fields related to currents, voltages and magnetic fields in magnetodynamic problems is developed in the frame of the finite subproblem finite element method. The method allows to correct the errors arising from thin conducting regions, that replace volume thin regions by surfaces but neglect border effects in…
Read MoreDesign of an Additively Manufacturable Multi-Material Light-Weight Gripper with integrated Bellows Actuators
Combining state-of-the-art additive manufacturing technologies with structural optimization has the potential to produce geometrically complex multi-material components with integrated functionalities and desired structural behavior. In this article, the simulation-driven design process of a multi-material light-weight gripper with an integrated pneumatic bellows actuator is described. The design of the bellows structure is based on a previously…
Read MoreHigh-Temperature Optical Characterization of Wide Band Gap Light Emitting Diodes and Photodiodes for Future Power Module Application
A systematic study of wide bandgap (WBG) based light emitting diodes (LEDs) and photodiodes (PDs) were conducted for the assessment of modular integration of optoelectronic devices into power modules. The temperature dependence of the photoluminescence (PL) efficiency of Indium gallium nitride/Gallium nitride (InGaN/GaN) multiple quantum wells (MQWs) material was studied from 10 to 800 K.…
Read MoreManaging and Optimizing Quality of Service in 5G Environments Across the Complete SLA Lifecycle
The 5G is the fifth generation of mobile broadband, cellular technologies, and networks that promises a major change in mobility by evolving connected business realities. In such an emerging environment, reliable Service Level Agreements (SLA) and anticipation of breaches of Service Level Objectives (SLO) become compulsory. Thus, guaranteeing the required service quality, while also ensuring…
Read MoreInsight into the IEEE 802.1 Qcr Asynchronous Traffic Shaping in Time Sensitive Network
TSN is an attractive solution for latency-critical frame transmission built upon IEEE 802 architecture. Traffic scheduling and shaping in TSN aim to achieve bounded low latency and zero congestion loss. However, the most widespread solution (i.e. Time-Aware Shaper) requires a networkwide precision clock reference and only targets on cyclical traffic flows. This paper focuses on…
Read MoreOver-The-Air Testing of Automotive Antennas and Wireless Links in The Installed State on The Basis of LTE Downlink Communication Parameters
Modern automobiles have been turning more and more into wireless sensor and communication networks. Accordingly, the number of radio systems is steadily increasing. Due to strict safety requirements, these radio systems need to be tested extensively for functionality and reliability, especially under poor radio channel conditions. Beside the large electrical size of cars at frequencies…
Read MoreStrategies of the Level-By-Level Approach to the Minimal Route
The task of optimal path planning for drilling tool with numerical control is considered. Such tools are used in the production of printed circuit boards. The algorithm modification of level-by-level route construction for the approximate solution of the traveling salesman problem is discussed. Bypass objects can be specified either as a table of distances or…
Read More
