{"title":"DESIGN AND ANALYSIS OF COMB SHAPE MICROSTRIP PATCH ARRAY ANTENNA FOR WLAN APPLICATIONS","authors":"B. Ramya, C. Supratha, S. Robinson","doi":"10.21917/ijct.2018.0249","DOIUrl":"https://doi.org/10.21917/ijct.2018.0249","url":null,"abstract":"A comb shape rectangular slotted 1 4 microstrip patch array antenna is proposed and designed for wireless local area network applications. The functional parameters of the antenna namely, return loss, VSWR, radiation pattern are analyzed. The FR4 substrate is used to the proposed antenna. The dimension of proposed antenna is 143mm of width and 71mm of length and the patch dimension is 29.6mm of width and 38mm of length. The return loss and VSWR of 1 4 array antenna is -34.8815dB and 1.012, respectively. The rectangular slots are taken in equal length and width in order to enhance the performance.","PeriodicalId":30618,"journal":{"name":"ICTACT Journal on Communication Technology","volume":"9 1","pages":"1702-1705"},"PeriodicalIF":0.0,"publicationDate":"2018-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47209328","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A DECENTRALIZED ADAPTIVE MEDIUM ACCESS CONTROL FOR V2I VANET","authors":"S. Neelambike, J. Chandrika","doi":"10.21917/ijct.2018.0248","DOIUrl":"https://doi.org/10.21917/ijct.2018.0248","url":null,"abstract":"Vehicular Adhoc Networks (VANETs) resemble similar characteristic as Mobile Adhoc Network (MANETs). The performance of VANET are affected by factors such as mobility, vehicle density and environmental condition. Provisioning smart infotainment application on such network is challenging and efficient MAC is required. Recently many Medium Access Control (MAC) based approaches adopting Time Division Medium Access (TDMA) and Carrier Sense Medium Access or Collision Avoidance (CSMA/CA) has been presented for VANET. The simulation outcome of exiting approaches shows that TDMA based approach outperforms CSMA/CA based approaches. However, TDMA based approaches incurs bandwidth wastages. To address, cognitive radio techniques is adopted by existing research. However, it incurs computation overhead and varied environmental condition such as urban, rural and highway are not considered. This work present a decentralized adaptive MAC (DAMAC) that maximize system throughput and minimize collision. Experiment are conducted to evaluate performance of DAMAC over exiting approaches. The outcome shows significant over existing approaches.","PeriodicalId":30618,"journal":{"name":"ICTACT Journal on Communication Technology","volume":"9 1","pages":"1696-1701"},"PeriodicalIF":0.0,"publicationDate":"2018-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43078229","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Chun Hoe Lee, Kit Guan Lim, M. K. Tan, R. Chin, K. Teo
{"title":"HYBRID SIMULATION NETWORK FOR VEHICULAR AD HOC NETWORK (VANET)","authors":"Chun Hoe Lee, Kit Guan Lim, M. K. Tan, R. Chin, K. Teo","doi":"10.21917/ijct.2018.0247","DOIUrl":"https://doi.org/10.21917/ijct.2018.0247","url":null,"abstract":"Intelligent Transportation Systems (ITS) plays a vital role in providing different means of traffic management and enables users to be better informed of traffic condition, promoting safer, coordinated and efficient use of transport network. Vehicular Ad Hoc Network (VANET) shows promising reliability and validity in ITS. But, it poses challenges to researchers in designing protocol specifically for VANET as the deployment of VANET in real world will incur high cost. Therefore, simulation and non-physical testbed implementation have been widely adopted by the VANET research community in the development and assessment of the new or improved system and protocol of VANET. This paper presents a viable simulation platform for network development. Besides, a code cast or better known as network coding, a data packet transmission method has been developed and introduced into VANET protocol using the presented platform to assess and determine the potential of the introduced simulation platform.","PeriodicalId":30618,"journal":{"name":"ICTACT Journal on Communication Technology","volume":"9 1","pages":"1686-1695"},"PeriodicalIF":0.0,"publicationDate":"2018-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43978207","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A REALIZATION OF THE AUTOMATIC ESTABLISHMENT SYSTEM OF SECONDARY SERVER BASED ON THE WEB SERVICE","authors":"RyongSu Kim, Y. Sin","doi":"10.21917/ijct.2018.0253","DOIUrl":"https://doi.org/10.21917/ijct.2018.0253","url":null,"abstract":"In this paper we propose the method for preparing the preliminary server which can perform the role of the primary server when it may be attacked or other abnormal issues happen through the data synchronization system based on the web service. We propose and realize a new method to establish the replication system which can replace the primary server by changing the IP address of the secondary server in case the primary server has stopped working while serving the customers the information preparing the primary and secondary servers. The important point is that the changed data of the primary server should be sent to the secondary server’s database and that the added files should also be sent. In order to solve this problem we suggest the immediate synchronization protocol based on the web service and propose the method to safely establishment the secondary server through the data synchronization system of streaming style. This method makes the services of the several servers identical, thus can also be applied to the cloud computing.","PeriodicalId":30618,"journal":{"name":"ICTACT Journal on Communication Technology","volume":"9 1","pages":"1721-1727"},"PeriodicalIF":0.0,"publicationDate":"2018-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43148542","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"PERFORMANCE SIMULATION AND BER COMPARISION OFDM-MIMO SYSTEMS IN AWGN AND RAYLEIGH FADING CHANNELS WITH BPSK MODULATION SCHEMES","authors":"Sandeep K Jain, Lalit Bhanwrela, P. Jain","doi":"10.21917/ijct.2018.0251","DOIUrl":"https://doi.org/10.21917/ijct.2018.0251","url":null,"abstract":"Behavior of communication medium play vital role in the growth of wireless communication system. To understand various wireless channel environments such as additive white Gaussian noise (AWGN) and Rayleigh fading channels in orthogonal frequency division multiplexing (OFDM) along with multiple input and multiple output (MIMO) system, we analyze mathematical relation of bit error rate (BER) against Signal to Noise ratio (SNR) and verified the same using MATLAB simulation, while considering the BPSK modulation scheme. The performance measured in terms of BER is evaluated for various channels of OFDM-MIMO system along with variation in number of antennas at transmitter and receiver side. It has been demonstrated that the BER and probability of detection improves against SNR per bit, as the diversity employs at transmitter or/and receiver end.","PeriodicalId":30618,"journal":{"name":"ICTACT Journal on Communication Technology","volume":"9 1","pages":"1712-1715"},"PeriodicalIF":0.0,"publicationDate":"2018-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49045710","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"SECURE LOCALIZATION USING COORDINATED GRADIENT DESCENT TECHNIQUE FOR UNDERWATER WIRELESS SENSOR NETWORKS","authors":"Baranidharan, K. Varadharajan","doi":"10.21917/ijct.2018.0252","DOIUrl":"https://doi.org/10.21917/ijct.2018.0252","url":null,"abstract":"In the Underwater Wireless Sensor Networks (UWSN) provide a solution for several aquatic and oceanographic applications. All these UWSN applications are need to be aware of the nodes positioning. In some insecure environment, the misleading data can be transmitted to the sonobuoys or monitoring systems in the network. This may disrupt the functions of the nodes. Thus, the secured localization algorithms are designed to resistant against attack and try to achieve the localization correctly. This paper shows that modified secure localization algorithm based Gradient Descent Algorithm (GDA) to remove the misleading information in the networks. This modified algorithms the normal nodes are cooperate with each other to reduce the localization error and to improve the pruning percentage.","PeriodicalId":30618,"journal":{"name":"ICTACT Journal on Communication Technology","volume":"9 1","pages":"1716-1720"},"PeriodicalIF":0.0,"publicationDate":"2018-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49609159","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"PERFORMANCE ANALYSIS OF TRANSMIT POWER CONTROL SCHEME IN COGNITIVE RADIO NETWORK","authors":"Sandeep Jain, Y. S. Randhawa, K. Singh","doi":"10.21917/ijct.2018.0245","DOIUrl":"https://doi.org/10.21917/ijct.2018.0245","url":null,"abstract":"","PeriodicalId":30618,"journal":{"name":"ICTACT Journal on Communication Technology","volume":"9 1","pages":"1673-1680"},"PeriodicalIF":0.0,"publicationDate":"2018-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46763790","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Energy Balanced and Efficient Clustering Method for Wireless Sensor Networks","authors":"Yong Chan Lee, Y. Sin, W. Jang, U. Choe","doi":"10.21917/IJCT.2017.0241","DOIUrl":"https://doi.org/10.21917/IJCT.2017.0241","url":null,"abstract":"In this paper the energy balanced and efficient clustering method based on balance of energy consumption of nodes in WSN is proposed, which may be applied to any WSN. The almost static centralized protocol that differs from previous methods is proposed, the main feature of which is that the sinks transmit most of control message and process most of data. First, EBEC method is proposed, which optimizes by considering energy consumption on transmitting and receiving data, energy consumption on the reclustering and hot-spot problem that be optimized individually in previous works. In order to implement this method, VW BAK-C algorithm is used by introducing the concept of variable weighted Euclid distance to k-clustering algorithm. Second, the previous clustering methods are classified into random method and the method based on QoS according to the characteristic of cluster head rotation, and average of total energy consumption of nodes is analyzed mathematically. The proposed method is compared and analyzed. Third, the performance of the proposed method is evaluated by comparing with other clustering methods through simulation.","PeriodicalId":30618,"journal":{"name":"ICTACT Journal on Communication Technology","volume":"8 1","pages":"1640-1649"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47258700","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
R. Alimoradi, Seiied-Mohammad-Javad Razavian, A. Ramzi
{"title":"A Study of Bilinear Maps in Wireless Sensor Networks","authors":"R. Alimoradi, Seiied-Mohammad-Javad Razavian, A. Ramzi","doi":"10.21917/IJCT.2017.0237","DOIUrl":"https://doi.org/10.21917/IJCT.2017.0237","url":null,"abstract":"In the past, a large part of security requirements of wireless sensor networks (WSN) were fulfilled by symmetric cryptography systems. But, today by introduction of new needs in these networks and their security development, researchers of security and cryptography try to find new ways to increase efficiency and security of wireless sensor networks. Improving computational power of sensors used in wireless sensor networks made application of public key cryptography in WSN possible. Identity based cryptography is one important type of public key cryptography which using some bilinear functions called pairing functions was seriously applied. In this paper we will look at some researches done to find how to use pairings in wireless sensor networks.","PeriodicalId":30618,"journal":{"name":"ICTACT Journal on Communication Technology","volume":"8 1","pages":"1611-1617"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47866113","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"DESIGN AND PERFORMANCE ANALYSIS OF UWB CIRCULAR RING ANTENNA WITH DEFECTED GROUND STRUCTURE","authors":"Neha Tanzeem Sagar, M. Meena, P. Shukla","doi":"10.21917/IJCT.2017.0243","DOIUrl":"https://doi.org/10.21917/IJCT.2017.0243","url":null,"abstract":"A compact circular ring antenna with defected ground structure (DGS) has been design for Ultra-Wide Band (UWB) applications. Initially, a circular patch antenna is design by introducing a rectangular DGS structure. Further, slot has been inserted in circular patch to improve the impedance bandwidth. The proposed design covers the frequency range of 2.4-10.4GHz below -10dB. Proposed antenna has design and fabricated on FR-4 substrate having 1.5mm, 4.3 thickness and dielectric constant, respectively. The performance of the designed antenna is analyzing with optimized dimensions in terms of return loss, VSWR, radiation pattern, gain characteristics, group delay and surface current distributions. Further, performance analysis of the proposed antenna has also been compared with existing suggested antennas in literature with compact in size. The fabricated antenna shows a good result with simulations software.","PeriodicalId":30618,"journal":{"name":"ICTACT Journal on Communication Technology","volume":"8 1","pages":"1656-1663"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44883632","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}