{"title":"Simulation of SAR imaging complexity and structural similarity through frequency domain algorithms using MATLAB","authors":"Aditi Kumar, Vinayak Tiwari","doi":"10.1109/ICCCCM.2013.6648905","DOIUrl":"https://doi.org/10.1109/ICCCCM.2013.6648905","url":null,"abstract":"The algorithms that processes electromagnetic back scattered echo holds importance in Synthetic Aperture Radar (SAR) imaging. The selection criteria of an appropriate algorithm depend on application requirement of SAR technique. The computational complexity of Range Doppler Algorithm (RDA) and Chirp Scaling Algorithm (CSA) differs in terms of the procedure adopted for Range Cell Migration Correction (RCMC). In this paper, computational complexities and structural similarities between processed images by these two algorithms are studied through their processing steps on varying pixel size images with the help of MATLAB tool.","PeriodicalId":230396,"journal":{"name":"2013 International Conference on Control, Computing, Communication and Materials (ICCCCM)","volume":"239 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126813897","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Secured routing over manet using Enhanced Secured Routing (ESR)","authors":"R. Agrawal, S. Sahu","doi":"10.1109/ICCCCM.2013.6648919","DOIUrl":"https://doi.org/10.1109/ICCCCM.2013.6648919","url":null,"abstract":"Security problem in MANET has been prevailing even after several researches by the various authors. Since application of security mechanism affects the system performance very much therefore there is always scope for further research in this area. Another major cause is fast technology growth in the area of MANET. Recent researches are focusing on another mechanism of security which involves trust management or Identity Based Cryptography (IBC) which has improved the security of the MANET to a great extent. This paper provides a modified trust mechanism for increasing the security over MANET using IBC along with reduced processing time and load on the system. It assigns keys to every incoming node which is used only once per communication between the nodes and hence high performance is assured.","PeriodicalId":230396,"journal":{"name":"2013 International Conference on Control, Computing, Communication and Materials (ICCCCM)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124734314","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Prachi Gupta, Prashant Singh, Rajshri Kumari Chaudhry, P. Srivastava
{"title":"Design and analysis of RF MEMS Varactor for extended tuning range","authors":"Prachi Gupta, Prashant Singh, Rajshri Kumari Chaudhry, P. Srivastava","doi":"10.1109/ICCCCM.2013.6648915","DOIUrl":"https://doi.org/10.1109/ICCCCM.2013.6648915","url":null,"abstract":"Electrostatically actuated parallel plate MEMS Varactor is a low power, highly sensitive and robust device. Simple parallel plate Varactor structure possesses a maximum tuning range of 1.5:1 after which the plates start collapsing. In the present paper we have employed different Varactor designs for extended tuning range. The major effort is done to develop a Varactor that can achieve tuning range greater than 1.5. The design and analysis is carried out on COMSOL Multiphysics simulation tool in accordance with standard POLYMUMP'S process.","PeriodicalId":230396,"journal":{"name":"2013 International Conference on Control, Computing, Communication and Materials (ICCCCM)","volume":"181 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128243954","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Iris recognition using fractional coefficients of transforms, Wavelet Transforms and Hybrid Wavelet Transforms","authors":"Sudeep D. Thepade, Pooja Bidwai","doi":"10.1109/ICCCCM.2013.6648921","DOIUrl":"https://doi.org/10.1109/ICCCCM.2013.6648921","url":null,"abstract":"Iris recognition is the best breed authentication process among all the biometric traits. It is a biometric identification process that uses visual patterns of irides. Iris recognition has been acknowledged as one of the most accurate biometric modalities because of its high recognition rate. Here performance comparison among various proposed techniques of Iris Recognition using the fractional coefficients of transformed Iris images is done considering Genuine Acceptance Ratio(GAR).The proposed method presents Iris recognition using Fractional coefficients of Cosine, Walsh, Haar, Slant and Kekre Transforms their Wavelet Transforms and Hybrid Wavelet Transforms. The experiments are done on 384 samples of palacky university dataset. The experiments showed that the fractional coefficient of transformed iris images gives higher GAR than considering 100% coefficients. Results show that Cosine and Haar Transforms outperforms at 0.10% fractional coefficients. Walsh wavelet transforms gives better performance at 0.10% fractional coefficients among all the Wavelet transform techniques implemented. DCT-Walsh Hybrid Wavelet Transforms outperforms over other Hybrid wavelet transforms implemented at 0.10% fractional coefficients. From the above it is clear that Wavelet Transforms and Hybrid Wavelet Transforms gives better results than Transforms.","PeriodicalId":230396,"journal":{"name":"2013 International Conference on Control, Computing, Communication and Materials (ICCCCM)","volume":"73 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129597083","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}