{"title":"Wide Band Inset Feed Microstrip Patch Antenna for Mobile Communication","authors":"Z. Ali, V. K. Singh, A. K. Singh, S. Ayub","doi":"10.1109/CSNT.2013.20","DOIUrl":"https://doi.org/10.1109/CSNT.2013.20","url":null,"abstract":"The main aim of proposed work is to obtain a large bandwidth with reduced size. The proposed micro strip antenna has a wide bandwidth covering the range from 1.806-2.978 GHz. By using new inset feed technique, wide bandwidth of 68.69% has been achieved which is suitable for Personal communication system (PCS 1.85-1.88 GHz) and IEEE 802.11b/g (2.4-2.485 GHz). The proposed patch antenna is designed and simulated on the Zealand IE3D software and the hardware of the proposed micro strip antenna is tested on the network analyzer.","PeriodicalId":111865,"journal":{"name":"2013 International Conference on Communication Systems and Network Technologies","volume":"204 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-04-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115029316","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Speaker Identification Using Whispered Speech","authors":"N. P. Jawarkar, R. S. Holambe, T. Basu","doi":"10.1109/CSNT.2013.167","DOIUrl":"https://doi.org/10.1109/CSNT.2013.167","url":null,"abstract":"The study of closed set text-independent speaker identification using whisper speech is presented in this paper. A new feature called temporal Teager energy based sub band cepstral coefficients (TTESBCC) is proposed. The work presented compares the performance of four feature sets: Mel frequency cepstral coefficients (MFCC), temporal energy of sub band cepstral coefficients (TESBCC), weighted instantaneous frequency (WIF) and TTESBCC. Next, outputs of three classifiers are combined and its performance is compared with that of the individual classifiers. The speaker identification system is trained using neutral speech and tested using neutral and whisper speech. The database of twenty five speakers containing speech utterances recorded in one of the Indian languages (Marathi) in the neutral and whisper environments is used for experimentation. Gaussian mixture model is used for classification. It is observed that performance of the speaker identification system degrades drastically when tested using whisper speech utterances. Fusion of classifiers enhances the speaker identification accuracy in both whisper and neutral environment.","PeriodicalId":111865,"journal":{"name":"2013 International Conference on Communication Systems and Network Technologies","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-04-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116565023","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Survey on ECG Signal Denoising Techniques","authors":"Sarang L. Joshi, Rambabu, Vatti, R. Tornekar","doi":"10.1109/CSNT.2013.22","DOIUrl":"https://doi.org/10.1109/CSNT.2013.22","url":null,"abstract":"Noise always degrades the quality of ECG signal. ECG noise removal is complicated due to time varying nature of ECG signal. As the ECG signal is used for the primary diagnosis and analysis of heart diseases, a good quality of ECG signal is necessary. A survey of various types of noises corrupting ECG signal and various approaches based on Wavelet Transform, Fuzzy logic, FIR filtering, Empirical Mode Decomposition used in denoising the signal effectively are presented in this paper. The result tables comparing the performances of various denoising techniques based on related parameters are included.","PeriodicalId":111865,"journal":{"name":"2013 International Conference on Communication Systems and Network Technologies","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-04-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117330563","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Aware-BDI: An Extension of the BDI Model Incorporating Situational Awareness","authors":"M. S. Hegde, S. Singh","doi":"10.1109/CSNT.2013.30","DOIUrl":"https://doi.org/10.1109/CSNT.2013.30","url":null,"abstract":"In this paper, we address the problems faced by a group of agents lacking global knowledge and global communications, by the introduction of a belief sharing mechanism. The Belief-Desire-Intention (BDI) architecture lacks a framework that would facilitate effective communication, to bring about situational awareness among agents in an insecure environment. We extend the BDI architecture with the concept of situational awareness. Agents can gain awareness by exchanging beliefs, ascertaining the truth of such retrieved beliefs and measuring the credibility of a peer agent. Aware-BDI mainly increases the situational awareness of the agents, thereby increasing operational efficiency and probability of attack detection.","PeriodicalId":111865,"journal":{"name":"2013 International Conference on Communication Systems and Network Technologies","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-04-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129362421","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Design of Fault Tolerant Logic under Network Error Using HARQ Scheme for Brake-by-Wire System","authors":"Qing Li, Kuktae Kim, Man-bok Park, Hunmo Kim","doi":"10.1109/CSNT.2013.181","DOIUrl":"https://doi.org/10.1109/CSNT.2013.181","url":null,"abstract":"Brake-by-Wire (BBW) system replaces traditional components such as the pumps, hoses, fluids and master cylinders with electronic sensors and actuators. Because of the increasing of the electronic components in the BBW system, there will be some errors occurred in communication channels because of the noise and Electro-Magnetic Interference (EMI). Moreover, system failures will be occurred by these errors and these failures can make a safety-related malfunction of the BBW system. Once, there is a safety-related malfunction in the BBW system, the drivers' and passengers' lives will be directly threatened. To solve these problems in the BBW system, this paper presents a design of fault tolerant logic for the BBW system, which includes an Electro-Mechanical Brake (EMB) controlled by a fuzzy controller. In this paper, we designed a fault tolerant logic for the BBW system with hybrid automatic repeat request (HARQ) scheme using Cyclic Redundancy Check (CRC) codes and Reed-Solomon (R-S) codes. CRC codes are used to detect errors and Reed-Solomon codes are used to correct errors. This paper also presents the ability of the fault tolerant logic to the EMB system and the performance is proved.","PeriodicalId":111865,"journal":{"name":"2013 International Conference on Communication Systems and Network Technologies","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-04-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129932847","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Fuzzy Based Control of Two Link Robotic Manipulator and Comparative Analysis","authors":"Manjeet, S. Sathans","doi":"10.1109/CSNT.2013.121","DOIUrl":"https://doi.org/10.1109/CSNT.2013.121","url":null,"abstract":"This paper presents the design and implementation of fuzzy based controller for the general form of two-link planar robotic manipulator. Also for comparative analysis, the conventional controllers, proportional-derivative (PD), proportional-integral-derivative (PID) and computed torque control are implemented on the same system under same conditions. The comparative analysis of the results demonstrates that the fuzzy logic controller is best among all the controllers and the simulation results confirm that the system can track the desired trajectory. Computer simulation results on a two-link planar robotic manipulator are presented to show tracking capability and effectiveness of the proposed control schemes. The simulations have been carried out using Matlab.","PeriodicalId":111865,"journal":{"name":"2013 International Conference on Communication Systems and Network Technologies","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-04-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123732947","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Comparative Analysis Study of E-learning and Traditional Learning in Technical Institution","authors":"B. Khatri, P. Chouskey, M. Singh","doi":"10.1109/CSNT.2013.165","DOIUrl":"https://doi.org/10.1109/CSNT.2013.165","url":null,"abstract":"The E-Learning is learning through electronic means with the Internet as the renowned choice. The success of E-Learning depends on the following factors: learning effectiveness, cost effectiveness and Institutional commitment, access, faculty satisfaction, and student satisfaction. As accessing has become more widely permitted through the open courseware and the like with reduced E-Learning cost as a result, more ELearning employment should yield higher achievements in learning effectiveness, and faculty and student satisfaction toward E-Learning. Among four components of E-Learning included contents, LMS (Learning Management Systems), communication, and evaluation, the quality of learning material or online E-Learning content gets more challenging as it is the main criteria in teachers' up-to-date skills and students' learning quality. In this paper we present the results of our survey conduced on various aspects of the analysis of the ELearning system.","PeriodicalId":111865,"journal":{"name":"2013 International Conference on Communication Systems and Network Technologies","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-04-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121200863","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Mental Task Classification Based on HMM and BPNN","authors":"S. Nasehi, H. Pourghassem","doi":"10.1109/CSNT.2013.53","DOIUrl":"https://doi.org/10.1109/CSNT.2013.53","url":null,"abstract":"Effective feature extraction and accurate classification of EEG signals have important role in performance of Brain-Computer Interface (BCI) systems. In this paper, a mental task classification approach based on HMM and BPNN is proposed. In this approach, spectral and spatial features are extracted from the L-second epochs. Then transition matrix is calculated based on Hidden Markov Model (HMM) to reduce the feature vector dimension for each the extracted features sequence. Finally, a multi layer perceptron (MLP) neural network is used to classify and recognize the different mental task. The proposed approach is applied to classify three mental tasks (left hand movement imagination, right hand movement imagination and word generation) and it's performance has been evaluated for some influence parameters and other existing methods.","PeriodicalId":111865,"journal":{"name":"2013 International Conference on Communication Systems and Network Technologies","volume":"267 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-04-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114077198","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Implementation and Performance Comparison of Improved Route Maintenance Strategy in AODV for Quick Route Healing","authors":"A. Shastri, G. Shrivastava","doi":"10.1109/CSNT.2013.70","DOIUrl":"https://doi.org/10.1109/CSNT.2013.70","url":null,"abstract":"There have been various routing protocols proposed for static and mobile ad-hoc networks. AODV is an efficient reactive protocol uses traditional routing tables having one entry per destination. An important feature of AODV is the maintenance of time based states in each node, a routing entry not recently used is expired. In case of original AODV, when a link between two nodes fail, AODV issues RREQ control packets for the same destination and tries to find out a new route for it. This regeneration of control packet not only delays the process of data sending but also decreases the throughput of the network. Thus to overcome this decrease in throughput, this proposed approach uses a data structure named 'backup-list' to hold all the active routes for that destination and finds the optimal route. This enhances the packet delivery ratio as well as overall throughput of the network.","PeriodicalId":111865,"journal":{"name":"2013 International Conference on Communication Systems and Network Technologies","volume":"223 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-04-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121568516","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Management System Discussion of Electronic Commerce Security","authors":"Yaojun Yan, Shuning Li","doi":"10.1109/CSNT.2013.145","DOIUrl":"https://doi.org/10.1109/CSNT.2013.145","url":null,"abstract":"In resent years, with the ceaseless popularization and deepening of electronic commerce application, the service industry of electronic commerce is under the flourish development. In the improvement process, there have many problems such as the system environment imperfection, relevant regulation lag especially in the credit system, infringement of network intellectual property, malicious falsehood, phishing, network crime and consumer rights and interests protection. These problems influence the development confidence of electronic commerce in the whole world. The practical security management system of electronic commerce information shows the most security problems are caused by poor management. With the informatization development, establish the safe and convenient electronic commerce environment to ensure the commercial activity security has been the anxious problems at present.","PeriodicalId":111865,"journal":{"name":"2013 International Conference on Communication Systems and Network Technologies","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-04-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121578497","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}