{"title":"Application of Radio Frequency Controlled Intelligent Military Robot in Defense","authors":"Saradindu Naskar, Soumik Das, A. K. Seth, A. Nath","doi":"10.1109/CSNT.2011.88","DOIUrl":"https://doi.org/10.1109/CSNT.2011.88","url":null,"abstract":"In the present paper the authors tried to explore how a radio frequency controlled robot can be used in defense and in real war field. The military robot will be able to substitute the real human soldier in the battle field. The authors have tried to explore how a military robot will function. The military robot has a two barrel gun turret through which bullets can be fired. It has two cameras in synchronization with the turret which can rotate up and down, left and right up to a safe firing limit. Both the gun turret and the cameras are enclosed within a hemispherical shell which serves as a shield and assists and enables their motion. The robot vehicle can move like a tank, turning to any angle on its axis, moving forward and reverse turning left and right, running instantly into reverse direction using the same steering mechanism as present in tanks. The robot is radio operated, self powered, has back tracking facility, in case of loss of connection from the base station. A pair of guns has been installed on it, so that it can fire on enemies remotely when required. To aim the guns and view the road and the surroundings in which the robot is traveling, wireless cameras are installed on different sides of the robot for different vantage points. Wireless cameras will send back real time video and audio inputs which can be seen on a remote monitor in the base station from where the robot is being controlled and action can be taken accordingly. The robot can be controlled from a base station by means of radio frequency. It also has the ability to re-establish contact with the base station in case of a signal failure by retracing its path back for some distance. It can silently enter into an enemy area and send us all the information through its camera eyes. It is designed for fighting, reconnaissance as well as suicide attacks under certain circumstances.","PeriodicalId":294850,"journal":{"name":"2011 International Conference on Communication Systems and Network Technologies","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-06-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129341397","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Hierarchical Architecture for Mobile Ad Hoc Network with Internet Using Cluster Head Gateway","authors":"R. Gowri, A. Bagwari","doi":"10.1109/CSNT.2011.27","DOIUrl":"https://doi.org/10.1109/CSNT.2011.27","url":null,"abstract":"To connect the wired and wireless networks particularly the Mobile ad hoc Network is very interesting in real world situations due to its popularity and usefulness. Different mechanisms have been proposed to integrate MANETs and the Internet. These strategies differ in gateway discovery mechanism, cell switching criteria, ad hoc routing protocol. In our paper we remove the limitation from the above mentioned approaches and given a new approach in which cluster head and gateway will be same and that node is known as cluster head gateway (CHG) [1], in which all the responsibilities of cluster head and gateway will be perform by the CHG and we introduces the prediction table concepts and discusses a mechanism for selecting an alternate route in case if the CHG is unable to forward the packets to the destination, This approach providing Bi-directional connectivity between MANET and wired Nodes. By applying this approach we will reduce the overhead for deciding the cluster and gateway for an Ad hoc network and by maintaining the prediction table we can decide which node will work as CHG in future to make our communication unaffected. Finally, this paper conducts simulation experiments in the conditions where we connecting MANET nodes to the wired nodes using different networks.","PeriodicalId":294850,"journal":{"name":"2011 International Conference on Communication Systems and Network Technologies","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-06-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129050325","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Comparitive Study of Three Mobile Ad-hoc Network Routing Protocols Under Different Traffic Source","authors":"R. Jain, N. B. Khairnar, L. Shrivastava","doi":"10.1109/CSNT.2011.28","DOIUrl":"https://doi.org/10.1109/CSNT.2011.28","url":null,"abstract":"Ad hoc network is a network formed without any central administration which consists of nodes that use a wireless interface to send packet data. Since the nodes in a network of this kind can serve as routers and hosts, they can forward packets on behalf of other nodes and run user applications. A mobile ad hoc network (MANET) is probably the most well-known example of this networking paradigm having been around for over twenty years, mainly exploited to design tactical networks. Furthermore, the multi-hop ad hoc networking paradigm is often used for building sensor networks to study, control, and monitor events and phenomena. To exploit these potentialities, simulation modeling and theoretical analyses have to be complemented by real experiences (e.g., experiences/measurements on real prototypes), which provide both a direct evaluation of ad hoc networks and, at the same time, precious information for a realistic modeling of these systems. In this paper we will simulate the environment used for analyzing, evaluating and implementing AODV, DSR and DSDV routing protocols in MANET, to analyze the performance of above said protocols based on Packet Delivery Fraction, Average End-to-End Delay and Number of dropped data packets. We have compared these three protocols on the basis of two traffic sources and these are TCP and CBR. For our simulation we had used a discrete event simulator known as NS2 (i.e. Network Simulator Ver.2.27)","PeriodicalId":294850,"journal":{"name":"2011 International Conference on Communication Systems and Network Technologies","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-06-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129235723","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Performance & Benefits of Optical Code Division Multiplexing Access","authors":"D. Vyas, K. Roy, A. Katariya","doi":"10.1109/CSNT.2011.131","DOIUrl":"https://doi.org/10.1109/CSNT.2011.131","url":null,"abstract":"Multiplexing techniques for fiber networks attempt to access the vast bandwidth of the optical fiber with the aim of including multiple-access capability. Among the multiplexing techniques, Optical Code Division Multiple Access (OCDMA) has attractive characteristics that make it appropriate for high-speed fiber networks. OCDMA system may be parallel or serial model, its various parameters can be study by simulation.","PeriodicalId":294850,"journal":{"name":"2011 International Conference on Communication Systems and Network Technologies","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-06-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116322898","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Secure Image Based Watermark for 3D Images","authors":"S. Shrivastava, Siddhartha Choubey","doi":"10.1109/CSNT.2011.119","DOIUrl":"https://doi.org/10.1109/CSNT.2011.119","url":null,"abstract":"We present a general method to improve watermark robustness by exploiting the masking effect of surface roughness on watermark visibility, watermark technology has been successfully used for this purpose for other kinds of media such as images and vedio, but, a lot of work is again necessary to reach robustness and industrial applicability for 3D watermarking. In this paper we treat a specific aspect of 3D watermarking technology: the visual quality of the watermarked model. In particular, after a panoramic on 3D watermarking technology we present some ideas about this issue and we propose a method based on multiresoultion analysis to improve this aspect in future watermarking algorithm.","PeriodicalId":294850,"journal":{"name":"2011 International Conference on Communication Systems and Network Technologies","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-06-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115223163","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Opportunistic Spectrum Sensing by Employing Matched Filter in Cognitive Radio Network","authors":"S. Kapoor, S. Rao, G. Singh","doi":"10.1109/CSNT.2011.124","DOIUrl":"https://doi.org/10.1109/CSNT.2011.124","url":null,"abstract":"The sophistication possible in a software defined radio has now reached a level where each radio can conceivably perform many beneficial tasks that help the user and network. It can also minimize the spectral congestion. If a radio could use favourable frequencies and choose waveforms that would minimize and avoid interference with existing radio communication systems, it would be an ideal software defined radio or in general sense cognitive radio which has all the properties of software defined radio along with the property of artificial intelligence. The presented paper is underpinning on the spectrum sensing, which is performed by implementing matched filter and is supported along with the simulation results.","PeriodicalId":294850,"journal":{"name":"2011 International Conference on Communication Systems and Network Technologies","volume":"198 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-06-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115472422","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Survey on Next-Generation Hybrid Wireless Architectures","authors":"R. Chandana, Shweta Jain","doi":"10.1109/CSNT.2011.39","DOIUrl":"https://doi.org/10.1109/CSNT.2011.39","url":null,"abstract":"The Wireless communication networks are evolving rapidly. Current scenario demands connectivity anytime, anywhere with bandwidth intensive services such as videos, voice, text etc [3][4]. These are high data rate services and have more QoS requirement. For such situation hybrid network emerged as a promising solution. Hybrid wireless network can be seen as group of individual networks integrated as a single network and mobile nodes present in the network, can connect either via gateway node or directly to other network. This paper discusses various hybrid wireless architectures. A classification of hybrid wireless network based on pricing schemes is also presented.","PeriodicalId":294850,"journal":{"name":"2011 International Conference on Communication Systems and Network Technologies","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-06-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116172321","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Size Reduction of Microstrip Patch Antenna Using Defected Microstrip Structures","authors":"V. Kushwah, G. Tomar","doi":"10.1109/CSNT.2011.50","DOIUrl":"https://doi.org/10.1109/CSNT.2011.50","url":null,"abstract":"Use of discontinuities in ground planes or in micro strip lines is currently employed to improve the performance of different passive circuits. It includes size reduction of amplifiers, enhancement of filter characteristics and applications to suppress harmonics in patch antennas. This paper presents an improved method of size reduction of a micro strip antenna using Defected Micro strip Structure. It does so by introducing imperfections in the micro strip antenna on the conducting layer using a DMS designed defect. The design was simulated using IE3D Electromagnetic Simulator. The results are very encouraging as it increases the number of components in a given constant area. On the other hand, a new proposal, called defected micro strip structure (DMS), has been successfully used in reducing the size of, and can be further used as tuning technique for, rectangular patch antennas.","PeriodicalId":294850,"journal":{"name":"2011 International Conference on Communication Systems and Network Technologies","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-06-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116218898","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Novel Complete Set of Walsh and Inverse Walsh Transforms for Signal Processing","authors":"Z. M. Yusuf, S. A. Abbasi, A. Alamoud","doi":"10.1109/CSNT.2011.108","DOIUrl":"https://doi.org/10.1109/CSNT.2011.108","url":null,"abstract":"In this paper, we design and implement a novel complete set of Walsh and inverse Walsh transforms for signal processing. The system consists of Walsh Transforms (WT), Digital Signal Processing (DSP) block, inverse Walsh transform (IWT) and a dividing block. The Walsh and inverse Walsh transforms are designed to produce correct results for any input data combinations. A DSP block is designed to perform addition, subtraction and dyadic convolution of Walsh coefficients of two signals. It is found that the proposed Walsh transform structure is superior to many of the reported results when it is implemented on FPGAs.","PeriodicalId":294850,"journal":{"name":"2011 International Conference on Communication Systems and Network Technologies","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-06-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127140158","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Uma Maheswararao Ch, Y. S. Kishore, Babu K Amaresh
{"title":"Sliding Mode Speed Control of a DC Motor","authors":"Uma Maheswararao Ch, Y. S. Kishore, Babu K Amaresh","doi":"10.1109/CSNT.2011.86","DOIUrl":"https://doi.org/10.1109/CSNT.2011.86","url":null,"abstract":"The main objective of this paper is to control the speed of separately excited DC Motor using a Sliding mode controller based on VSS approach. This controller is based on variable structure systems which aim at reducing the peak overshoot, steady state error and settling time of a DC Motor. In the first stage, PI controller is used to control the speed of DC Motor. A model is developed and simulated using MATLAB/SIMULINK. Later on the same is done with sliding mode controller. The speed control of DC Motor using both PI and Sliding mode controllers is studied and the results are compared. The simulation results show that Sliding mode controller is superior than PI for speed control of DC motor. Since the SMC is robust in presence of disturbances, the desired speed is perfectly tracked.","PeriodicalId":294850,"journal":{"name":"2011 International Conference on Communication Systems and Network Technologies","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-06-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127174428","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}