International Journal of communication and computer Technologies最新文献

筛选
英文 中文
Isolation Enhancement in Microstrip Antenna Arrays  微带天线阵列的隔离增强
International Journal of communication and computer Technologies Pub Date : 2019-01-01 DOI: 10.31838/ijccts/02.02.02
R. Gayathri, K. Ramakrishnan
{"title":"Isolation Enhancement in Microstrip Antenna Arrays ","authors":"R. Gayathri, K. Ramakrishnan","doi":"10.31838/ijccts/02.02.02","DOIUrl":"https://doi.org/10.31838/ijccts/02.02.02","url":null,"abstract":"Slotted Meander-Line Resonator (SMLR) is implemented by creating defect in the microstrip structure. This resonator is designed to block the surface current at the resonant frequency of the two patch antennas coupled along H-plane operating at 3.6 GHz. The proposed configuration provides an improvement in isolation by 10 dB (measured value) with a reduced edge-to-edge spacing of 7 mm (λ0/9). This resonator has been designed, simulated, and validated experimentally. KeywordsAntenna array, isolation enhancement, meander lines, mutual coupling reduction, resonators.","PeriodicalId":415674,"journal":{"name":"International Journal of communication and computer Technologies","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130159451","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
SOLDIER HEALTH MONITORING AND TRACKING SYSTEM 士兵健康监测和跟踪系统
International Journal of communication and computer Technologies Pub Date : 2019-01-01 DOI: 10.31838/ijccts/07.sp01.05
{"title":"SOLDIER HEALTH MONITORING AND TRACKING SYSTEM","authors":"","doi":"10.31838/ijccts/07.sp01.05","DOIUrl":"https://doi.org/10.31838/ijccts/07.sp01.05","url":null,"abstract":"","PeriodicalId":415674,"journal":{"name":"International Journal of communication and computer Technologies","volume":"138 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127977882","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
VLSI Implementation of Lossless Video Compression Technique Using New Cross Diamond Search Algorithm  基于交叉菱形搜索算法的无损视频压缩技术的VLSI实现
International Journal of communication and computer Technologies Pub Date : 2019-01-01 DOI: 10.31838/ijccts/05.01.06
{"title":"VLSI Implementation of Lossless Video Compression Technique Using New Cross Diamond Search Algorithm ","authors":"","doi":"10.31838/ijccts/05.01.06","DOIUrl":"https://doi.org/10.31838/ijccts/05.01.06","url":null,"abstract":"","PeriodicalId":415674,"journal":{"name":"International Journal of communication and computer Technologies","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117147126","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
IMPROVEMENT OF POWER QUALITY USING PQ THEORY BASED SERIES HYBRID ACTIVE POWER FILTER 基于pq理论的串联混合有源电力滤波器改善电能质量
International Journal of communication and computer Technologies Pub Date : 2019-01-01 DOI: 10.31838/ijccts/04.01.10
{"title":"IMPROVEMENT OF POWER QUALITY USING PQ THEORY BASED SERIES HYBRID ACTIVE POWER FILTER","authors":"","doi":"10.31838/ijccts/04.01.10","DOIUrl":"https://doi.org/10.31838/ijccts/04.01.10","url":null,"abstract":"","PeriodicalId":415674,"journal":{"name":"International Journal of communication and computer Technologies","volume":"399 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122775234","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Bayesian saliency using the spectral form of Relaxation aid cuts  使用谱形式的贝叶斯显著性松弛辅助切割
International Journal of communication and computer Technologies Pub Date : 2019-01-01 DOI: 10.31838/ijccts/03.01.07
{"title":"Bayesian saliency using the spectral form of Relaxation aid cuts ","authors":"","doi":"10.31838/ijccts/03.01.07","DOIUrl":"https://doi.org/10.31838/ijccts/03.01.07","url":null,"abstract":"","PeriodicalId":415674,"journal":{"name":"International Journal of communication and computer Technologies","volume":"74 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121711297","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Design and implementation of modeling and tuning of first or-der process with dead time using PID controller 利用PID控制器设计并实现了带死区一阶过程的建模与整定
International Journal of communication and computer Technologies Pub Date : 2019-01-01 DOI: 10.31838/ijccts/07.01.01
Saravanakumar.G Prasath. J.S Sathish Kumar.S Yuvaraj.D
{"title":"Design and implementation of modeling and tuning of first or-der process with dead time using PID controller","authors":"Saravanakumar.G Prasath. J.S Sathish Kumar.S Yuvaraj.D","doi":"10.31838/ijccts/07.01.01","DOIUrl":"https://doi.org/10.31838/ijccts/07.01.01","url":null,"abstract":"The proposed research involves modeling and tuning of first order process with dead time using tuning methods. A conventional controller or advanced controller is proposed. The selection of controller and tuning methods are based on the plant operating conditions and also depending upon the process dynamics.The PID controller is most widely used for industrial process control. The modeling can be per-form for moreover single or multi-variable and linear or non-linear process. The proposed work is the modeling and simulation of three different first order processes with dead time. The standard controller tuning method is used to obtain the steady state response of first order with dead time.","PeriodicalId":415674,"journal":{"name":"International Journal of communication and computer Technologies","volume":"74 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114846703","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Latent Palm Print Matching Based on Minutiae Features for Forensic Applications  基于细节特征的潜在掌纹匹配在法医应用中的应用
International Journal of communication and computer Technologies Pub Date : 2019-01-01 DOI: 10.31838/ijccts/02.02.03
R. Abinaya, Sesha Vidhya S., S. Vadivel
{"title":"Latent Palm Print Matching Based on Minutiae Features for Forensic Applications ","authors":"R. Abinaya, Sesha Vidhya S., S. Vadivel","doi":"10.31838/ijccts/02.02.03","DOIUrl":"https://doi.org/10.31838/ijccts/02.02.03","url":null,"abstract":"In forensic application, palm print recognition receives significant attention because of the developing live scan palm print technology. In most forensic applications, the critical evidence obtained is those of latent palm prints. About 30% of the latent obtained from the crime scenes are of palms. Palm prints has large area of foreground, which consists of 1000’s of minutiae points. Hence latent palm print matching requires development of novel strategies. Here we design a palm print matching strategy which is based on minutiae clustering. The minutiae match propagation is also considered for the minutiae correspondence. Minutiae clusters are formed based on the local minutiae features. Each cluster contains minutiae that contain similar local features. The correspondence between two palm print is done within the clusters. Mated minutiae pairs are considered by the Minutiae match propagation algorithm to determine the correspondence between the query palm print and the full palm print. Starting with the initial minutiae pair, the algorithm checks for further matches with the full palm print image.","PeriodicalId":415674,"journal":{"name":"International Journal of communication and computer Technologies","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129361551","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
FAQ-MAST TCP for Secure Download  用于安全下载的FAQ-MAST TCP
International Journal of communication and computer Technologies Pub Date : 2019-01-01 DOI: 10.31838/ijccts/02.01.08
{"title":"FAQ-MAST TCP for Secure Download ","authors":"","doi":"10.31838/ijccts/02.01.08","DOIUrl":"https://doi.org/10.31838/ijccts/02.01.08","url":null,"abstract":"","PeriodicalId":415674,"journal":{"name":"International Journal of communication and computer Technologies","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121897461","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A chaos based image encryption algorithm using Shimizu- Morioka system 基于Shimizu- Morioka系统的混沌图像加密算法
International Journal of communication and computer Technologies Pub Date : 2019-01-01 DOI: 10.31838/ijccts/06.01.02
{"title":"A chaos based image encryption algorithm using Shimizu- Morioka system","authors":"","doi":"10.31838/ijccts/06.01.02","DOIUrl":"https://doi.org/10.31838/ijccts/06.01.02","url":null,"abstract":"","PeriodicalId":415674,"journal":{"name":"International Journal of communication and computer Technologies","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123792619","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Using encryption Algorithms to enhance the Data Security in Cloud Computing  利用加密算法增强云计算中的数据安全性
International Journal of communication and computer Technologies Pub Date : 2019-01-01 DOI: 10.31838/ijccts/01.02.12
Mandeep Kaur, M. Mahajan
{"title":"Using encryption Algorithms to enhance the Data Security in Cloud Computing ","authors":"Mandeep Kaur, M. Mahajan","doi":"10.31838/ijccts/01.02.12","DOIUrl":"https://doi.org/10.31838/ijccts/01.02.12","url":null,"abstract":"Cloud computing is the concept implemented to decipher the Daily Computing Problems. Cloud computing is basically virtual pool of resources and it provides these resources to users via internet. Cloud computing is the internet based development and used in computer technology. The prevalent problem associated with cloud computing is data privacy, security, anonymity and reliability etc. But the most important between them is security and how cloud provider assures it. In this research paper, the proposed work plan is to eliminate the concerns regarding data privacy using encryption algorithms to enhance the security in cloud as per different perspective of cloud customers.","PeriodicalId":415674,"journal":{"name":"International Journal of communication and computer Technologies","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123849449","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信