{"title":"QPSO for synthesis of linear array of isotropic antennas to generate flat-top beam including multiple null placement","authors":"Hemant Patidar, G. K. Mahanti","doi":"10.1109/ICSPCOM.2015.7150617","DOIUrl":"https://doi.org/10.1109/ICSPCOM.2015.7150617","url":null,"abstract":"The authors proposed an evolutionary algorithm based on quantum particle swarm optimization to generate flattop beam from a linear array of isotropic antennas. An effort is also made to reduce the side lobe level including multiple null placements with minimum variation in ripple of flat-top beam. This is generally done by changing excitation current amplitude of the elements. Phases of some of the elements are kept either at zero degree or at 180 degree. The generated pattern is broadside in the vertical plane. One example has been presented with twenty-six isotropic antennas. Array factor is calculated by using inverse fast Fourier transform to reduce the computational time significantly. The results obtained from the given example demonstrate the effectiveness of the proposed method. Although, the proposed method is developed and applied to a linear array of isotropic antennas; however, the principle can easily be extended to other type of arrays.","PeriodicalId":318875,"journal":{"name":"2015 International Conference on Signal Processing and Communication (ICSC)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-03-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124738271","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Simulating MATLAB system models in PSpice","authors":"Parag Choudhary, Abha Jain","doi":"10.1109/ICSPCOM.2015.7150668","DOIUrl":"https://doi.org/10.1109/ICSPCOM.2015.7150668","url":null,"abstract":"This paper describes a new technique to simulate MATLAB system models in PSpice environment. The algorithmic component of the design is developed using MATLAB, and then exported to a C-model which can be read and simulated by PSpice using its newly developed PSpice Device Modeling Interface (DMI). The paper describes in detail the changes required to make the MATLAB C-Model compatible with PSpice device modeling requirements. Once circuit simulations using PSpice are signed-off, the algorithmic module can be targeted to FPGA, SOC or PCB for implementation.","PeriodicalId":318875,"journal":{"name":"2015 International Conference on Signal Processing and Communication (ICSC)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-03-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122571726","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Timing offset estimation using pilot sequence for UWB-IR receivers in IEEE 802.15.4a channel model","authors":"Saurabh Dhiman, Anshul Tyagi","doi":"10.1109/ICSPCOM.2015.7150636","DOIUrl":"https://doi.org/10.1109/ICSPCOM.2015.7150636","url":null,"abstract":"This paper demonstrates the Data aided (DA) synchronization for single user in IEEE 802.15.4a channel for coherent and Non-coherent UWB-IR receivers. Random Timing Offset before every transmitted sequence is estimated using Walsh codes which act as pilot sequence to achieve timing synchronization. Sliding correlation window of appropriate length is used to perform correlation of received bit stream and locally generated templates at receiver. Autocorrelation of Walsh code will show a peak value at an instant, this instant of peak is estimated as symbol boundary. In order to show the performance of pilot sequence, Error variance Vs SNR (dB) and its BER performance is plotted for different lengths of pilot sequences in Residential and Office environments.","PeriodicalId":318875,"journal":{"name":"2015 International Conference on Signal Processing and Communication (ICSC)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-03-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127545554","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Secure data aggregation and intrusion detection in wireless sensor networks","authors":"P. Vamsi, K. Kant","doi":"10.1109/ICSPCOM.2015.7150633","DOIUrl":"https://doi.org/10.1109/ICSPCOM.2015.7150633","url":null,"abstract":"Data Aggregation (DA) is a technique of data gathering in Wireless Sensor Networks (WSNs). It provide advantages such as reporting consolidated data, reducing data redundancy, improving network lifetime etc. However, deploying WSNs in hostile and remote environments presents security vulnerabilities that can lead to various security attacks such as energy based attacks, attacks on data aggregation etc. Numerous secure DA techniques have been proposed in the literature. However, lightweight models using Trust Monitoring System (TMS) and Intrusion Detection Systems (IDS) are limited. This paper presents a secure data aggregation framework for Wireless Sensor Networks (WSNs) using TMS at node level and IDS at Base Station (BS) side. Each node in the network assesses the behavior of its neighbors using trust ratings and performs the network activities such as cluster head selection, data aggregation, and reporting to the BS. Then, BS analyzes the received information using IDS and reports the information about the malicious activities back to nodes in the network. In this way, the proposed model identifies and isolates the malicious nodes from the data aggregation process. Simulation results show the effectiveness of this model.","PeriodicalId":318875,"journal":{"name":"2015 International Conference on Signal Processing and Communication (ICSC)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-03-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129811585","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Recent trends in energy harvesting for green wireless sensor networks","authors":"P. Jain","doi":"10.1109/ICSPCOM.2015.7150616","DOIUrl":"https://doi.org/10.1109/ICSPCOM.2015.7150616","url":null,"abstract":"Battery powered wireless sensor networks (WSN) although can be installed at reduced cost but due to their high powerconsumption and corresponding need for regular battery replacement has made wireless sensor network difficult andcostly to maintain. Energy harvesting is the process by which energy readily available from the environment, and iscaptured and converted into usable electrical energy. Combining WSN nodes with energy harvesters one can approach to even a“Greener” world. This evaluation will make the revolution towards long-lived large scale sensor networks. Thechallenge is in the WSN node integration with an energy harvester, power management, energystorage, communications, and range of sensor types. This paper briefly discusses the trends in energy harvestingtechnologies used for WSN. It also reviews various energy harvesting technologies currently available or underdevelopment.","PeriodicalId":318875,"journal":{"name":"2015 International Conference on Signal Processing and Communication (ICSC)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-03-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123476765","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}