{"title":"Isolation Enhancement in Microstrip Antenna Arrays ","authors":"R. Gayathri, K. Ramakrishnan","doi":"10.31838/ijccts/02.02.02","DOIUrl":"https://doi.org/10.31838/ijccts/02.02.02","url":null,"abstract":"Slotted Meander-Line Resonator (SMLR) is implemented by creating defect in the microstrip structure. This resonator is designed to block the surface current at the resonant frequency of the two patch antennas coupled along H-plane operating at 3.6 GHz. The proposed configuration provides an improvement in isolation by 10 dB (measured value) with a reduced edge-to-edge spacing of 7 mm (λ0/9). This resonator has been designed, simulated, and validated experimentally. KeywordsAntenna array, isolation enhancement, meander lines, mutual coupling reduction, resonators.","PeriodicalId":415674,"journal":{"name":"International Journal of communication and computer Technologies","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130159451","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"SOLDIER HEALTH MONITORING AND TRACKING SYSTEM","authors":"","doi":"10.31838/ijccts/07.sp01.05","DOIUrl":"https://doi.org/10.31838/ijccts/07.sp01.05","url":null,"abstract":"","PeriodicalId":415674,"journal":{"name":"International Journal of communication and computer Technologies","volume":"138 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127977882","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"VLSI Implementation of Lossless Video Compression Technique Using New Cross Diamond Search Algorithm ","authors":"","doi":"10.31838/ijccts/05.01.06","DOIUrl":"https://doi.org/10.31838/ijccts/05.01.06","url":null,"abstract":"","PeriodicalId":415674,"journal":{"name":"International Journal of communication and computer Technologies","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117147126","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"IMPROVEMENT OF POWER QUALITY USING PQ THEORY BASED SERIES HYBRID ACTIVE POWER FILTER","authors":"","doi":"10.31838/ijccts/04.01.10","DOIUrl":"https://doi.org/10.31838/ijccts/04.01.10","url":null,"abstract":"","PeriodicalId":415674,"journal":{"name":"International Journal of communication and computer Technologies","volume":"399 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122775234","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Bayesian saliency using the spectral form of Relaxation aid cuts ","authors":"","doi":"10.31838/ijccts/03.01.07","DOIUrl":"https://doi.org/10.31838/ijccts/03.01.07","url":null,"abstract":"","PeriodicalId":415674,"journal":{"name":"International Journal of communication and computer Technologies","volume":"74 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121711297","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Design and implementation of modeling and tuning of first or-der process with dead time using PID controller","authors":"Saravanakumar.G Prasath. J.S Sathish Kumar.S Yuvaraj.D","doi":"10.31838/ijccts/07.01.01","DOIUrl":"https://doi.org/10.31838/ijccts/07.01.01","url":null,"abstract":"The proposed research involves modeling and tuning of first order process with dead time using tuning methods. A conventional controller or advanced controller is proposed. The selection of controller and tuning methods are based on the plant operating conditions and also depending upon the process dynamics.The PID controller is most widely used for industrial process control. The modeling can be per-form for moreover single or multi-variable and linear or non-linear process. The proposed work is the modeling and simulation of three different first order processes with dead time. The standard controller tuning method is used to obtain the steady state response of first order with dead time.","PeriodicalId":415674,"journal":{"name":"International Journal of communication and computer Technologies","volume":"74 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114846703","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Latent Palm Print Matching Based on Minutiae Features for Forensic Applications ","authors":"R. Abinaya, Sesha Vidhya S., S. Vadivel","doi":"10.31838/ijccts/02.02.03","DOIUrl":"https://doi.org/10.31838/ijccts/02.02.03","url":null,"abstract":"In forensic application, palm print recognition receives significant attention because of the developing live scan palm print technology. In most forensic applications, the critical evidence obtained is those of latent palm prints. About 30% of the latent obtained from the crime scenes are of palms. Palm prints has large area of foreground, which consists of 1000’s of minutiae points. Hence latent palm print matching requires development of novel strategies. Here we design a palm print matching strategy which is based on minutiae clustering. The minutiae match propagation is also considered for the minutiae correspondence. Minutiae clusters are formed based on the local minutiae features. Each cluster contains minutiae that contain similar local features. The correspondence between two palm print is done within the clusters. Mated minutiae pairs are considered by the Minutiae match propagation algorithm to determine the correspondence between the query palm print and the full palm print. Starting with the initial minutiae pair, the algorithm checks for further matches with the full palm print image.","PeriodicalId":415674,"journal":{"name":"International Journal of communication and computer Technologies","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129361551","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"FAQ-MAST TCP for Secure Download ","authors":"","doi":"10.31838/ijccts/02.01.08","DOIUrl":"https://doi.org/10.31838/ijccts/02.01.08","url":null,"abstract":"","PeriodicalId":415674,"journal":{"name":"International Journal of communication and computer Technologies","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121897461","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A chaos based image encryption algorithm using Shimizu- Morioka system","authors":"","doi":"10.31838/ijccts/06.01.02","DOIUrl":"https://doi.org/10.31838/ijccts/06.01.02","url":null,"abstract":"","PeriodicalId":415674,"journal":{"name":"International Journal of communication and computer Technologies","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123792619","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Using encryption Algorithms to enhance the Data Security in Cloud Computing ","authors":"Mandeep Kaur, M. Mahajan","doi":"10.31838/ijccts/01.02.12","DOIUrl":"https://doi.org/10.31838/ijccts/01.02.12","url":null,"abstract":"Cloud computing is the concept implemented to decipher the Daily Computing Problems. Cloud computing is basically virtual pool of resources and it provides these resources to users via internet. Cloud computing is the internet based development and used in computer technology. The prevalent problem associated with cloud computing is data privacy, security, anonymity and reliability etc. But the most important between them is security and how cloud provider assures it. In this research paper, the proposed work plan is to eliminate the concerns regarding data privacy using encryption algorithms to enhance the security in cloud as per different perspective of cloud customers.","PeriodicalId":415674,"journal":{"name":"International Journal of communication and computer Technologies","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123849449","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}