IJERD (www.ijerd.com) International Journal of Engineering Research and Development IJERD : hard copy of journal, Call for Papers 2012, publishing of journal, journal of science and technology, research paper publishing, where to publish research paper,
This document summarizes the design and testing of a manually constructed Wi-Fi cantenna (combination of a can and antenna). It describes how a cantenna works to focus and strengthen Wi-Fi signals by reflecting radio waves within a metal can to the receiving wire. The document provides details on the design process, including selecting an appropriately sized can, marking positions for drilling holes, soldering on an N-connector and wire, and connecting to a computer's Wi-Fi card. It then discusses testing the cantenna in a college campus, finding it improved signal strength by 20% over the existing antenna in areas with weak signals. Finally, it outlines potential future work involving testing other homemade antenna designs and comparing performances.
Current Approaches for Extending Range of Wi-Fi Networkijsrd.com
Nowadays, Wi-Fi networks have numerous emerging applications, ranging from backbone Wi-Fi networks, last-mile wireless networks and Wi-Fi direct networks. We can categorize the application into two types: (1) indoor wireless networks and (2) outdoor wireless networks. Indoor Wi-Fi networks include wireless networks and Wi-Fi direct networks, which usually have shorter links than outdoor wireless networks. Compared with indoor wireless networks, outdoor Wi-Fi networks attend as the network backbone or the infrastructure for Internet connection and usually have a longer transmission range. Besides, a data transmission usually traverses through multiple expectancy in outdoor wireless networks while it often takes only one expect in indoor wireless network. The distance limitations and data rates with Wi-Fi networks are more arduous to calculate due to varying data rates, capacity, interference, etc. In this paper, we discuss the various methodologies for increasing range of Wi-Fi network.
The aim of this paper is to determine the viability of Indoor Optical Wireless Communication System. This paper introduces Visible Light Communication along with its merits, demerits and applications. Then the main characteristics of VLC system are described, around which the project is designed. Multiple Input-Multiple Output (MIMO) technique is used in the project in order to enhance the data rate of transmission. Instead of using a system of only one LED and one APD, which transmits only one bit at a time, a system of 4 LEDs and 4 APDs is introduced, which increases the data rates by 300% from the previous case. We observe the signal, noise, SNR, BER etc. across the room dimension. Finally, in the last chapter we summarize our results on the basis of MATLAB simulations and propose some modifications to this model that can be implemented in future.
Data transmission through visible light communication (li fi)Omkar Omkar
To transfer data from one device to another using the visual medium as the route of transmission. Our project involves transferring data through Visible light communication (VLC). We designed and implemented VLC transceiver circuit and verified the transmission
of data using DSO in Prototype I. We implemented the Audio transmission of data through VLC in Prototype II. We studied the characteristics of LED, its limitations and studied the different modulation techniques, discussed the issues and challenges faced in implementing the hardware design. We have defined the problem of nonlinearity of LED’s and have studied to mitigate this problem. Based on the change in the signal characteristics due to several phenomena from LED to photo receiver, introduced the channel modeling techniques.
Current Approaches for Extending Range of Wi-Fi Networkijsrd.com
Nowadays, Wi-Fi networks have numerous emerging applications, ranging from backbone Wi-Fi networks, last-mile wireless networks and Wi-Fi direct networks. We can categorize the application into two types: (1) indoor wireless networks and (2) outdoor wireless networks. Indoor Wi-Fi networks include wireless networks and Wi-Fi direct networks, which usually have shorter links than outdoor wireless networks. Compared with indoor wireless networks, outdoor Wi-Fi networks attend as the network backbone or the infrastructure for Internet connection and usually have a longer transmission range. Besides, a data transmission usually traverses through multiple expectancy in outdoor wireless networks while it often takes only one expect in indoor wireless network. The distance limitations and data rates with Wi-Fi networks are more arduous to calculate due to varying data rates, capacity, interference, etc. In this paper, we discuss the various methodologies for increasing range of Wi-Fi network.
The aim of this paper is to determine the viability of Indoor Optical Wireless Communication System. This paper introduces Visible Light Communication along with its merits, demerits and applications. Then the main characteristics of VLC system are described, around which the project is designed. Multiple Input-Multiple Output (MIMO) technique is used in the project in order to enhance the data rate of transmission. Instead of using a system of only one LED and one APD, which transmits only one bit at a time, a system of 4 LEDs and 4 APDs is introduced, which increases the data rates by 300% from the previous case. We observe the signal, noise, SNR, BER etc. across the room dimension. Finally, in the last chapter we summarize our results on the basis of MATLAB simulations and propose some modifications to this model that can be implemented in future.
Data transmission through visible light communication (li fi)Omkar Omkar
To transfer data from one device to another using the visual medium as the route of transmission. Our project involves transferring data through Visible light communication (VLC). We designed and implemented VLC transceiver circuit and verified the transmission
of data using DSO in Prototype I. We implemented the Audio transmission of data through VLC in Prototype II. We studied the characteristics of LED, its limitations and studied the different modulation techniques, discussed the issues and challenges faced in implementing the hardware design. We have defined the problem of nonlinearity of LED’s and have studied to mitigate this problem. Based on the change in the signal characteristics due to several phenomena from LED to photo receiver, introduced the channel modeling techniques.
The following ppt gives overview about Optical Communication and the underlying principle with the general overview of all the contents for optical communication
Li-Fi stands
for Light-Fidelity is transmission of data through
illumination taking the fibber out of fiber optic by
sending data through an LED light bulb
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
The following ppt gives overview about Optical Communication and the underlying principle with the general overview of all the contents for optical communication
Li-Fi stands
for Light-Fidelity is transmission of data through
illumination taking the fibber out of fiber optic by
sending data through an LED light bulb
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
Similar to IJERD (www.ijerd.com) International Journal of Engineering Research and Development IJERD : hard copy of journal, Call for Papers 2012, publishing of journal, journal of science and technology, research paper publishing, where to publish research paper,
Exploring the Advantages of Dual-Band Antenna | GQ ResearchGQ Research
In this article, we explore the intricacies of dual-band antennas, their applications, and the impact they have on enhancing connectivity in diverse environments.
Benefits of Gwave Technology's Log-Periodic and ka Band AntennaGwave Technology
Leading RF and microwave solutions provider Gwave Technology offers a variety of antennas for diverse applications. Gwave log-periodic antenna and Ka band antenna are explored for their unique features, usage, and wireless communication benefits.
802.11n and 802.11ac wi fi antenna options for cisco indoor&outdoor a psIT Tech
Access point type, building design and materials, and client location affect how your Wi-Fi network performs. Get the highest data rates from your Wi-Fi access points by selecting the right Cisco antenna for each situation.
Wirelessmobilechargingthroughmicrowaves2 r aviRavi Kumar
WIRELESS CHARGING
INTRODUCTION Always the recharging of mobile phone batteries has always been a problem for us. This problem will be solved after our proposal………!!!!!!!! In this paper a new proposal has been made so as to make the recharging of the mobile phones is done automatically as you talk in your mobile phone!
3. The microwave signal is transmitted from the transmitter along with the message signal using special kind of antennas called slotted wave guide antenna at a frequency is 2.45 GHz Thus the more you talk, the more is your mobile phone charged!!!!!!! This is new isn’t?!!
4. What Is Microwaves????? Microwaves are good for transmitting information from one place to another because microwave energy can penetrate haze, light rain and snow, clouds, and smoke. Shorter microwaves are used in remote sensing. These microwaves are used for radar like the Doppler radar used in weather forecasts
5. Microwaves > Frequency Range: 3GHZ to 300GHZ > Remort Sensing. > Communication Industry. >2.45GHZ ISM Band.
6. TRANSMITTER DESIGN The MAGNETRON is a self-contained microwave oscillator that operates differently from the linearbeam tubes, such as the TWT and the klystron. ——Magnetron is used to produce high-power output required in radar and communications equipment —Microwaves used in mobile communication are also produced by similar Oscillators
7. Magnetron - Construction
8. PRINCIPLE OF OPERATION
9. WHAT’S RECTANNAE??? What’s rectannae you are confused…….it’s nothing but the combination of rectifier and antenna. Antenna is to receive the microwave signal and it just feed the signal to rectifier . Rectifier is to convert the AC signal to PULSATING DC signal.
10. RECEIVER DESIGN The basic addition to the mobile phone is going to be the rectenna. A rectenna is a rectifying antenna, a special type of antenna that is used to directly convert microwave energy into DC electricity.
11. ADVANTAGES Use of separate chargers is eliminated. Electricity is saved The phone can be charged anywhere anytime. Wireless energy transfer can potentially recharge the mobile phones without chords. Only one microwave transmitter can serve to all the service providers in that area. The need of different types of chargers by different manufacturers is totally eliminated.
12. DISADVANTAGES The transmitter and receiver also should be very powerful devices as the distance increases. Slower Charging. Wireless transmission of the energy causes some drastic effects to human body, because of its radiation. More costly.
International Journal of Engineering Research and Development (IJERD)IJERD Editor
journal publishing, how to publish research paper, Call For research paper, international journal, publishing a paper, IJERD, journal of science and technology, how to get a research paper published, publishing a paper, publishing of journal, publishing of research paper, reserach and review articles, IJERD Journal, How to publish your research paper, publish research paper, open access engineering journal, Engineering journal, Mathemetics journal, Physics journal, Chemistry journal, Computer Engineering, Computer Science journal, how to submit your paper, peer reviw journal, indexed journal, reserach and review articles, engineering journal, www.ijerd.com, research journals,
yahoo journals, bing journals, International Journal of Engineering Research and Development, google journals, hard copy of journal
Similar to IJERD (www.ijerd.com) International Journal of Engineering Research and Development IJERD : hard copy of journal, Call for Papers 2012, publishing of journal, journal of science and technology, research paper publishing, where to publish research paper, (20)
A Novel Method for Prevention of Bandwidth Distributed Denial of Service AttacksIJERD Editor
Distributed Denial of Service (DDoS) Attacks became a massive threat to the Internet. Traditional
Architecture of internet is vulnerable to the attacks like DDoS. Attacker primarily acquire his army of Zombies,
then that army will be instructed by the Attacker that when to start an attack and on whom the attack should be
done. In this paper, different techniques which are used to perform DDoS Attacks, Tools that were used to
perform Attacks and Countermeasures in order to detect the attackers and eliminate the Bandwidth Distributed
Denial of Service attacks (B-DDoS) are reviewed. DDoS Attacks were done by using various Flooding
techniques which are used in DDoS attack.
The main purpose of this paper is to design an architecture which can reduce the Bandwidth
Distributed Denial of service Attack and make the victim site or server available for the normal users by
eliminating the zombie machines. Our Primary focus of this paper is to dispute how normal machines are
turning into zombies (Bots), how attack is been initiated, DDoS attack procedure and how an organization can
save their server from being a DDoS victim. In order to present this we implemented a simulated environment
with Cisco switches, Routers, Firewall, some virtual machines and some Attack tools to display a real DDoS
attack. By using Time scheduling, Resource Limiting, System log, Access Control List and some Modular
policy Framework we stopped the attack and identified the Attacker (Bot) machines
Hearing loss is one of the most common human impairments. It is estimated that by year 2015 more
than 700 million people will suffer mild deafness. Most can be helped by hearing aid devices depending on the
severity of their hearing loss. This paper describes the implementation and characterization details of a dual
channel transmitter front end (TFE) for digital hearing aid (DHA) applications that use novel micro
electromechanical- systems (MEMS) audio transducers and ultra-low power-scalable analog-to-digital
converters (ADCs), which enable a very-low form factor, energy-efficient implementation for next-generation
DHA. The contribution of the design is the implementation of the dual channel MEMS microphones and powerscalable
ADC system.
Influence of tensile behaviour of slab on the structural Behaviour of shear c...IJERD Editor
-A composite beam is composed of a steel beam and a slab connected by means of shear connectors
like studs installed on the top flange of the steel beam to form a structure behaving monolithically. This study
analyzes the effects of the tensile behavior of the slab on the structural behavior of the shear connection like slip
stiffness and maximum shear force in composite beams subjected to hogging moment. The results show that the
shear studs located in the crack-concentration zones due to large hogging moments sustain significantly smaller
shear force and slip stiffness than the other zones. Moreover, the reduction of the slip stiffness in the shear
connection appears also to be closely related to the change in the tensile strain of rebar according to the increase
of the load. Further experimental and analytical studies shall be conducted considering variables such as the
reinforcement ratio and the arrangement of shear connectors to achieve efficient design of the shear connection
in composite beams subjected to hogging moment.
Gold prospecting using Remote Sensing ‘A case study of Sudan’IJERD Editor
Gold has been extracted from northeast Africa for more than 5000 years, and this may be the first
place where the metal was extracted. The Arabian-Nubian Shield (ANS) is an exposure of Precambrian
crystalline rocks on the flanks of the Red Sea. The crystalline rocks are mostly Neoproterozoic in age. ANS
includes the nations of Israel, Jordan. Egypt, Saudi Arabia, Sudan, Eritrea, Ethiopia, Yemen, and Somalia.
Arabian Nubian Shield Consists of juvenile continental crest that formed between 900 550 Ma, when intra
oceanic arc welded together along ophiolite decorated arc. Primary Au mineralization probably developed in
association with the growth of intra oceanic arc and evolution of back arc. Multiple episodes of deformation
have obscured the primary metallogenic setting, but at least some of the deposits preserve evidence that they
originate as sea floor massive sulphide deposits.
The Red Sea Hills Region is a vast span of rugged, harsh and inhospitable sector of the Earth with
inimical moon-like terrain, nevertheless since ancient times it is famed to be an abode of gold and was a major
source of wealth for the Pharaohs of ancient Egypt. The Pharaohs old workings have been periodically
rediscovered through time. Recent endeavours by the Geological Research Authority of Sudan led to the
discovery of a score of occurrences with gold and massive sulphide mineralizations. In the nineties of the
previous century the Geological Research Authority of Sudan (GRAS) in cooperation with BRGM utilized
satellite data of Landsat TM using spectral ratio technique to map possible mineralized zones in the Red Sea
Hills of Sudan. The outcome of the study mapped a gossan type gold mineralization. Band ratio technique was
applied to Arbaat area and a signature of alteration zone was detected. The alteration zones are commonly
associated with mineralization. The alteration zones are commonly associated with mineralization. A filed check
confirmed the existence of stock work of gold bearing quartz in the alteration zone. Another type of gold
mineralization that was discovered using remote sensing is the gold associated with metachert in the Atmur
Desert.
Reducing Corrosion Rate by Welding DesignIJERD Editor
The paper addresses the importance of welding design to prevent corrosion at steel. Welding is
used to join pipe, profiles at bridges, spindle, and a lot more part of engineering construction. The
problems happened associated with welding are common issues in these fields, especially corrosion.
Corrosion can be reduced with many methods, they are painting, controlling humidity, and also good
welding design. In the research, it can be found that reducing residual stress on the welding can be
solved in corrosion rate reduction problem.
Preheating on 500oC and 600oC give better condition to reduce corosion rate than condition after
preheating 400oC. For all welding groove type, material with 500oC and 600oC preheating after 14 days
corrosion test is 0,5%-0,69% lost. Material with 400oC preheating after 14 days corrosion test is 0,57%-0,76%
lost.
Welding groove also influence corrosion rate. X and V type welding groove give better condition to reduce
corrosion rate than use 1/2V and 1/2 X welding groove. After 14 days corrosion test, the samples with
X welding groove type is 0,5%-0,57% lost. The samples with V welding groove after 14 days corrosion test is
0,51%-0,59% lost. The samples with 1/2V and 1/2X welding groove after 14 days corrosion test is 0,58%-
0,71% lost.
Router 1X3 – RTL Design and VerificationIJERD Editor
Routing is the process of moving a packet of data from source to destination and enables messages
to pass from one computer to another and eventually reach the target machine. A router is a networking device
that forwards data packets between computer networks. It is connected to two or more data lines from different
networks (as opposed to a network switch, which connects data lines from one single network). This paper,
mainly emphasizes upon the study of router device, it‟s top level architecture, and how various sub-modules of
router i.e. Register, FIFO, FSM and Synchronizer are synthesized, and simulated and finally connected to its top
module.
Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...IJERD Editor
This paper presents a component within the flexible ac-transmission system (FACTS) family, called
distributed power-flow controller (DPFC). The DPFC is derived from the unified power-flow controller (UPFC)
with an eliminated common dc link. The DPFC has the same control capabilities as the UPFC, which comprise
the adjustment of the line impedance, the transmission angle, and the bus voltage. The active power exchange
between the shunt and series converters, which is through the common dc link in the UPFC, is now through the
transmission lines at the third-harmonic frequency. DPFC multiple small-size single-phase converters which
reduces the cost of equipment, no voltage isolation between phases, increases redundancy and there by
reliability increases. The principle and analysis of the DPFC are presented in this paper and the corresponding
simulation results that are carried out on a scaled prototype are also shown.
Mitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVRIJERD Editor
Power quality has been an issue that is becoming increasingly pivotal in industrial electricity
consumers point of view in recent times. Modern industries employ Sensitive power electronic equipments,
control devices and non-linear loads as part of automated processes to increase energy efficiency and
productivity. Voltage disturbances are the most common power quality problem due to this the use of a large
numbers of sophisticated and sensitive electronic equipment in industrial systems is increased. This paper
discusses the design and simulation of dynamic voltage restorer for improvement of power quality and
reduce the harmonics distortion of sensitive loads. Power quality problem is occurring at non-standard
voltage, current and frequency. Electronic devices are very sensitive loads. In power system voltage sag,
swell, flicker and harmonics are some of the problem to the sensitive load. The compensation capability
of a DVR depends primarily on the maximum voltage injection ability and the amount of stored
energy available within the restorer. This device is connected in series with the distribution feeder at
medium voltage. A fuzzy logic control is used to produce the gate pulses for control circuit of DVR and the
circuit is simulated by using MATLAB/SIMULINK software.
Study on the Fused Deposition Modelling In Additive ManufacturingIJERD Editor
Additive manufacturing process, also popularly known as 3-D printing, is a process where a product
is created in a succession of layers. It is based on a novel materials incremental manufacturing philosophy.
Unlike conventional manufacturing processes where material is removed from a given work price to derive the
final shape of a product, 3-D printing develops the product from scratch thus obviating the necessity to cut away
materials. This prevents wastage of raw materials. Commonly used raw materials for the process are ABS
plastic, PLA and nylon. Recently the use of gold, bronze and wood has also been implemented. The complexity
factor of this process is 0% as in any object of any shape and size can be manufactured.
Spyware triggering system by particular string valueIJERD Editor
This computer programme can be used for good and bad purpose in hacking or in any general
purpose. We can say it is next step for hacking techniques such as keylogger and spyware. Once in this system if
user or hacker store particular string as a input after that software continually compare typing activity of user
with that stored string and if it is match then launch spyware programme.
A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...IJERD Editor
This paper presents a blind steganalysis technique to effectively attack the JPEG steganographic
schemes i.e. Jsteg, F5, Outguess and DWT Based. The proposed method exploits the correlations between
block-DCTcoefficients from intra-block and inter-block relation and the statistical moments of characteristic
functions of the test image is selected as features. The features are extracted from the BDCT JPEG 2-array.
Support Vector Machine with cross-validation is implemented for the classification.The proposed scheme gives
improved outcome in attacking.
Secure Image Transmission for Cloud Storage System Using Hybrid SchemeIJERD Editor
- Data over the cloud is transferred or transmitted between servers and users. Privacy of that
data is very important as it belongs to personal information. If data get hacked by the hacker, can be
used to defame a person’s social data. Sometimes delay are held during data transmission. i.e. Mobile
communication, bandwidth is low. Hence compression algorithms are proposed for fast and efficient
transmission, encryption is used for security purposes and blurring is used by providing additional
layers of security. These algorithms are hybridized for having a robust and efficient security and
transmission over cloud storage system.
Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...IJERD Editor
A thorough review of existing literature indicates that the Buckley-Leverett equation only analyzes
waterflood practices directly without any adjustments on real reservoir scenarios. By doing so, quite a number
of errors are introduced into these analyses. Also, for most waterflood scenarios, a radial investigation is more
appropriate than a simplified linear system. This study investigates the adoption of the Buckley-Leverett
equation to estimate the radius invasion of the displacing fluid during waterflooding. The model is also adopted
for a Microbial flood and a comparative analysis is conducted for both waterflooding and microbial flooding.
Results shown from the analysis doesn’t only records a success in determining the radial distance of the leading
edge of water during the flooding process, but also gives a clearer understanding of the applicability of
microbes to enhance oil production through in-situ production of bio-products like bio surfactans, biogenic
gases, bio acids etc.
Gesture Gaming on the World Wide Web Using an Ordinary Web CameraIJERD Editor
- Gesture gaming is a method by which users having a laptop/pc/x-box play games using natural or
bodily gestures. This paper presents a way of playing free flash games on the internet using an ordinary webcam
with the help of open source technologies. Emphasis in human activity recognition is given on the pose
estimation and the consistency in the pose of the player. These are estimated with the help of an ordinary web
camera having different resolutions from VGA to 20mps. Our work involved giving a 10 second documentary to
the user on how to play a particular game using gestures and what are the various kinds of gestures that can be
performed in front of the system. The initial inputs of the RGB values for the gesture component is obtained by
instructing the user to place his component in a red box in about 10 seconds after the short documentary before
the game is finished. Later the system opens the concerned game on the internet on popular flash game sites like
miniclip, games arcade, GameStop etc and loads the game clicking at various places and brings the state to a
place where the user is to perform only gestures to start playing the game. At any point of time the user can call
off the game by hitting the esc key and the program will release all of the controls and return to the desktop. It
was noted that the results obtained using an ordinary webcam matched that of the Kinect and the users could
relive the gaming experience of the free flash games on the net. Therefore effective in game advertising could
also be achieved thus resulting in a disruptive growth to the advertising firms.
Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...IJERD Editor
-LLC resonant frequency converter is basically a combo of series as well as parallel resonant ckt. For
LCC resonant converter it is associated with a disadvantage that, though it has two resonant frequencies, the
lower resonant frequency is in ZCS region[5]. For this application, we are not able to design the converter
working at this resonant frequency. LLC resonant converter existed for a very long time but because of
unknown characteristic of this converter it was used as a series resonant converter with basically a passive
(resistive) load. . Here, it was designed to operate in switching frequency higher than resonant frequency of the
series resonant tank of Lr and Cr converter acts very similar to Series Resonant Converter. The benefit of LLC
resonant converter is narrow switching frequency range with light load[6] . Basically, the control ckt plays a
very imp. role and hence 555 Timer used here provides a perfect square wave as the control ckt provides no
slew rate which makes the square wave really strong and impenetrable. The dead band circuit provides the
exclusive dead band in micro seconds so as to avoid the simultaneous firing of two pairs of IGBT’s where one
pair switches off and the other on for a slightest period of time. Hence, the isolator ckt here is associated with
each and every ckt used because it acts as a driver and an isolation to each of the IGBT is provided with one
exclusive transformer supply[3]. The IGBT’s are fired using the appropriate signal using the previous boards
and hence at last a high frequency rectifier ckt with a filtering capacitor is used to get an exact dc
waveform .The basic goal of this particular analysis is to observe the wave forms and characteristics of
converters with differently positioned passive elements in the form of tank circuits.
Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...IJERD Editor
LLC resonant frequency converter is basically a combo of series as well as parallel resonant ckt. For
LCC resonant converter it is associated with a disadvantage that, though it has two resonant frequencies, the
lower resonant frequency is in ZCS region [5]. For this application, we are not able to design the converter
working at this resonant frequency. LLC resonant converter existed for a very long time but because of
unknown characteristic of this converter it was used as a series resonant converter with basically a passive
(resistive) load. . Here, it was designed to operate in switching frequency higher than resonant frequency of the
series resonant tank of Lr and Cr converter acts very similar to Series Resonant Converter. The benefit of LLC
resonant converter is narrow switching frequency range with light load[6] . Basically, the control ckt plays a
very imp. role and hence 555 Timer used here provides a perfect square wave as the control ckt provides no
slew rate which makes the square wave really strong and impenetrable. The dead band circuit provides the
exclusive dead band in micro seconds so as to avoid the simultaneous firing of two pairs of IGBT’s where one
pair switches off and the other on for a slightest period of time. Hence, the isolator ckt here is associated with
each and every ckt used because it acts as a driver and an isolation to each of the IGBT is provided with one
exclusive transformer supply[3]. The IGBT’s are fired using the appropriate signal using the previous boards
and hence at last a high frequency rectifier ckt with a filtering capacitor is used to get an exact dc
waveform .The basic goal of this particular analysis is to observe the wave forms and characteristics of
converters with differently positioned passive elements in the form of tank circuits. The supported simulation
is done through PSIM 6.0 software tool
Amateurs Radio operator, also known as HAM communicates with other HAMs through Radio
waves. Wireless communication in which Moon is used as natural satellite is called Moon-bounce or EME
(Earth -Moon-Earth) technique. Long distance communication (DXing) using Very High Frequency (VHF)
operated amateur HAM radio was difficult. Even with the modest setup having good transceiver, power
amplifier and high gain antenna with high directivity, VHF DXing is possible. Generally 2X11 YAGI antenna
along with rotor to set horizontal and vertical angle is used. Moon tracking software gives exact location,
visibility of Moon at both the stations and other vital data to acquire real time position of moon.
“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...IJERD Editor
Simple Sequence Repeats (SSR), also known as Microsatellites, have been extensively used as
molecular markers due to their abundance and high degree of polymorphism. The nucleotide sequences of
polymorphic forms of the same gene should be 99.9% identical. So, Microsatellites extraction from the Gene is
crucial. However, Microsatellites repeat count is compared, if they differ largely, he has some disorder. The Y
chromosome likely contains 50 to 60 genes that provide instructions for making proteins. Because only males
have the Y chromosome, the genes on this chromosome tend to be involved in male sex determination and
development. Several Microsatellite Extractors exist and they fail to extract microsatellites on large data sets of
giga bytes and tera bytes in size. The proposed tool “MS-Extractor: An Innovative Approach to extract
Microsatellites on „Y‟ Chromosome” can extract both Perfect as well as Imperfect Microsatellites from large
data sets of human genome „Y‟. The proposed system uses string matching with sliding window approach to
locate Microsatellites and extracts them.
Importance of Measurements in Smart GridIJERD Editor
- The need to get reliable supply, independence from fossil fuels, and capability to provide clean
energy at a fixed and lower cost, the existing power grid structure is transforming into Smart Grid. The
development of a smart energy distribution grid is a current goal of many nations. A Smart Grid should have
new capabilities such as self-healing, high reliability, energy management, and real-time pricing. This new era
of smart future grid will lead to major changes in existing technologies at generation, transmission and
distribution levels. The incorporation of renewable energy resources and distribution generators in the existing
grid will increase the complexity, optimization problems and instability of the system. This will lead to a
paradigm shift in the instrumentation and control requirements for Smart Grids for high quality, stable and
reliable electricity supply of power. The monitoring of the grid system state and stability relies on the
availability of reliable measurement of data. In this paper the measurement areas that highlight new
measurement challenges, development of the Smart Meters and the critical parameters of electric energy to be
monitored for improving the reliability of power systems has been discussed.
Study of Macro level Properties of SCC using GGBS and Lime stone powderIJERD Editor
One of the major environmental concerns is the disposal of the waste materials and utilization of
industrial by products. Lime stone quarries will produce millions of tons waste dust powder every year. Having
considerable high degree of fineness in comparision to cement this material may be utilized as a partial
replacement to cement. For this purpose an experiment is conducted to investigate the possibility of using lime
stone powder in the production of SCC with combined use GGBS and how it affects the fresh and mechanical
properties of SCC. First SCC is made by replacing cement with GGBS in percentages like 10, 20, 30, 40, 50 and
by taking the optimum mix with GGBS lime stone powder is blended to mix in percentages like 5, 10, 15, 20 as
a partial replacement to cement. Test results shows that the SCC mix with combination of 30% GGBS and 15%
limestone powder gives maximum compressive strength and fresh properties are also in the limits prescribed by
the EFNARC.
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
Keynote at DIGIT West Expo, Glasgow on 29 May 2024.
Cheryl Hung, ochery.com
Sr Director, Infrastructure Ecosystem, Arm.
The key trends across hardware, cloud and open-source; exploring how these areas are likely to mature and develop over the short and long-term, and then considering how organisations can position themselves to adapt and thrive.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 3. In this session, we will cover desktop automation along with UI automation.
Topics covered:
UI automation Introduction,
UI automation Sample
Desktop automation flow
Pradeep Chinnala, Senior Consultant Automation Developer @WonderBotz and UiPath MVP
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Let's dive deeper into the world of ODC! Ricardo Alves (OutSystems) will join us to tell all about the new Data Fabric. After that, Sezen de Bruijn (OutSystems) will get into the details on how to best design a sturdy architecture within ODC.
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...UiPathCommunity
💥 Speed, accuracy, and scaling – discover the superpowers of GenAI in action with UiPath Document Understanding and Communications Mining™:
See how to accelerate model training and optimize model performance with active learning
Learn about the latest enhancements to out-of-the-box document processing – with little to no training required
Get an exclusive demo of the new family of UiPath LLMs – GenAI models specialized for processing different types of documents and messages
This is a hands-on session specifically designed for automation developers and AI enthusiasts seeking to enhance their knowledge in leveraging the latest intelligent document processing capabilities offered by UiPath.
Speakers:
👨🏫 Andras Palfi, Senior Product Manager, UiPath
👩🏫 Lenka Dulovicova, Product Program Manager, UiPath
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
IJERD (www.ijerd.com) International Journal of Engineering Research and Development IJERD : hard copy of journal, Call for Papers 2012, publishing of journal, journal of science and technology, research paper publishing, where to publish research paper,
1. International Journal of Engineering Research and Development
e-ISSN: 2278-067X, p-ISSN: 2278-800X, www.ijerd.com
Volume 3, Issue 2 (August 2012), PP. 01-06
Manually Designed Wi-Fi Cantenna and its Testing in Real-Time
Environment
Vrushali.V.Kadu
RTM Nagpur University, Assistant Professor, Department Of Information Technology, Shri. Ramdeobaba College of
Engineering and Management, Nagpur, India.
Abstract––Wi-Fi is a fantastic new gadget, but its reach is only about 50 to 100 meters. Fortunately it is possible to build
our own antenna cheaply (less than 10 US dollars) in an hour or two. Now a day, more individuals, businesses and local
governments are enjoying wireless internet access proliferating Wi-Fi hotspots, home, office, and public wireless
networks. However, Wi-Fi users are rarely completely satisfied with the signal strength offered by the off the shelf Wi-Fi
cards, routers, access points and USB adapters. Compounding to the coverage problems, many locate their routers, access
points or desktop Wi-Fi cards in a closet, against the wall or under a desk, diminishing signal strength and limiting
bandwidth. This research paper includes the steps for the Biquad antenna construction, requirements and software
testing of antenna on desktop to check the signal strength at various locations in campus area.
Keywords–– Wi-Fi, Routers, Access point, Wi-Fi cards, Antenna, signal strength, booster antenna, Cantenna.
I. INTRODUCTION
Wi-Fi signal booster antennas, also called Wi-Fi signal amplifiers are attached to routers or access points to boost
the signal. Good quality and powerful Wi-Fi signal amplifiers can increase the signal strength threefold. Bidirectional Wi-Fi
signal boosters increase the strength of transmitted, as well as received signals. That is, they work both ways. They boost
signal strength by as much as 600%. They can be used as laptop Wi-Fi signal boosters and extend range of Internet access
far beyond your home. The need for seamless, uninterrupted and reliable communication is one of the top priorities of every
house. The wide access to some really useful information base, for every kind of user makes it extremely important to set up
a repeater, which delivers high performance. Repeater is a networking device which, as the name suggests, repeats the
signal or increases the reach of the existing wireless network. Very often, it happens that a device has to be connected to an
existing wireless network, but it is away in a remote place in the house or a building, where the signal strength is too low or
unreachable. A wireless repeater is used in such cases to boost the signal strength or simply repeat the signal so that the said
computer comes under the coverage area.
Wireless signals are susceptible to a lot of data loss . When it comes to the wireless signal strength that will be
received, the topography of the place where we stay is also a deciding factor. If a large number of trees or buildings come in
between laptop and the router we are connecting to, the signal strength will be almost nil. Besides everything, the wireless
network cards, that come inbuilt, have very limited power and range. The answer then lies in using a wireless signal booster.
A simple solution is getting a wireless card with a higher power or attaching an external USB antenna to the laptop. Wireless
signal boosters are simple devices and can simply be plugged into the USB port of your laptop. The taller the antenna of
your wireless booster, the better the reception. The working of the wireless booster is pretty simple. It accepts strong signals
from the router and amplifies them inside your network, thus increasing the signal strength to a great deal. A wireless signal
booster consists of two antennas - the transmitting antenna and the receiving antenna. The receiving antenna is connected to
an intermediate amplifier. The other input to the intermediate amplifier is a radio signal source. The intermediate amplifier
amplifies the difference between the two signals; the received signal and the radio signal, and passes it over to a low-noise
amplifier. This is done to remove any unwanted signals. The low-noise amplifier is connected to the transmitter. The low-
noise amplifier further amplifies the received signal and sends it to the wireless card. The wireless signal antennas in the
laptops are located internally. Generally, there are two parallel antennas located on the two sides of the LCD screen[14]. The
internal location of the wireless antennas causes bad reception of the wireless signals. So, the first problem that a wireless
signal booster needs to solve, is to provide an external high gain antenna. This antenna needs to be directed to the access
point. The biquad is defined as a high gain antenna with an exceptionally large beam width. The problem faced with high
gain antennas are the beam width that the antenna is capable of. For instance a Yagi antenna design with high gain will
typically fall into a beam width range of 40 degrees or less. With the case of the biquad you can have an equal amount of
gain but with a substantial increase in the beam width. This allows ease of use while setting up the biquad as a directional
antenna.
This paper is organized as follows Section II gives a brief methodology to be employed, Section III includes
description of Cantenna. Section IV and V includes the design steps. Section VI includes antenna testing.
II. METHODOLOGY
The Aim is to design different Wi-Fi booster antenna and analyze the performance to improve the signal strength
for long distance. To overcome drawbacks of existing technology such as :
1
2. Manually Designed Wi-Fi Cantenna and its Testing in Real-Time Environment
The High Cost of booster Antennas available in the market. The booster antennas available in market costs very high in
dollars and are easily available in foreign countries. This adds to the cost of travelling or shipping the product to the user
destination.
The reduced Wi-Fi signal strength for long distance. This aims at increasing the number of access points but in spite of
these there are some hot spots or locations where the range is not available because of which we receive weaker signal
strength.[14]
For this, the objective is to use home made Wi-Fi booster antenna. Home made antennas solve the purpose of cost,
making it cost effective. It provides us with improved signal strength. To achieve this, we need to study the various
parameters of booster antenna available in the market, and increase the signal strength thereby improving the performance of
our antenna .The Work can be done on Real –Time basis by testing the performance of Booster antenna in the campus at
locations where the signal strength is weak.
The proposed plans of work for booster antennas include:
To Design different booster antennas and then analyze their performance to increase the signal strength [Manual
building and software based testing].
To Implement Wi-Fi monitoring application.
Test booster antennas for internet connectivity.
III. CANTENNA
Cantenna devices function by focusing and strengthening the radio wave receiving area of communication devices
such as wireless phones, internet, television and radios as opposed to conventional antennas which receive signals over a
broader area with minimal strength. When a radio wave enters the opening of the can it bounces off the can walls until it
reaches the receiving wire within the can. This receiving wire sends the information to the communication device with
minimal static or interference. The area in which the Cantenna can receive the optimum signal is also adjustable, allowing
the Cantenna to be used in a variety of locations and environments. A Cantenna consists of a hollow tube (usually a 40oz can)
and a coaxial cable, as shown in Figure
Figure 1: Cantenna Design
This can acts as a microwave waveguide by capturing, confining and propagating the radio frequency signal within
its metallic walls. The radio frequency is introduced into the can by a protruding conductor of a coaxial cable. The probe can
transmit and receive signals from the waveguide. The frequency that a Cantenna can propagate is a function of the diameter
of the tube. Cantenna operate as high pass filters since they can only propagate signal above a certain cut-off frequency. In
the case our project, we will be using the common wireless networking (WLAN) standard, IEEE 802.11n-2009 which is
transmitted at a frequency of 2.4GHz.
IV. CANTENNA DESIGN
Figure 2: Interior Design for Cantenna
2
3. Manually Designed Wi-Fi Cantenna and its Testing in Real-Time Environment
V. DESIGN STEPS FOR CANTENNA
1. Prepare the can: Obtain a clean, empty can (with one end open) of radius of 3.65cm - 4.67cm. It might be necessary to
remove the lip at the edge of the can so that it does not interfere with reception. Here: r = 3.65cm
2. Mark the position for drill holes: Use a Cantenna Calculator to calculate the dimensions - there are several available
online. Below, is one based in an Excel spreadsheet and another on a do-it-yourself website (Figure 3). Mark the position for
the N connector (at ¼ of the waveguide length) with a pencil. Here: ¼ LO = 3.1cm
Figure 3: Cantenna Measurements (a)
3. Drilling holes for the N connector and bolts: Using a drill (or a nail in combination with a hammer if an electric drill is
not available), drill a hole large enough to insert the N-connector and four holes for the securing bolts.
4. Soldering the N connector and copper wire: Cut the copper wire such that in total, the length of the connector and the
wire is ¼ LO = 3.1cm. Solder the wire onto the connector. After cooling, bolt the N connector into the can (to reduce
obstructions, keep the bolts inside the can and the nuts on the outside).
5.Connect to WLAN: Connect the Cantenna to the computer’s wireless card using a pig-tail cable. Note: One of end of the
cable will have the matching N male connector, the other will connect to the wireless card.
6. Find the best reception: Cantenna are linearly polarized. Rotate the Cantenna until the strongest signal is achieved. Use
Kismet (Linux-compatible) to determine the strength of the wireless signal.
Figure 3: Cantenna Measurements (b)
VI. ANTENNA TESTING
The Antenna testing is basically done on a desktop computer in college lab . The requirements for testing are :
1. Wi-Fi access point
2. Antenna
3. LAN card
4. Wireless software for wireless connectivity
The LAN card is fitted in the CPU and then an antenna is attached to it .The wireless software installation was
done for enabling the wireless connectivity. I had developed a software coding through which we can measure the strength
of signal in percentage which shows the accuracy in how much signal strength exactly we are getting. This idea came to my
mind because our campus is WI-FI campus and there are around 86 access points all over the campus , but still the signal
strength in some locations are still weak and due to which the speed is less. I had developed an Cantenna and tested in our
3
4. Manually Designed Wi-Fi Cantenna and its Testing in Real-Time Environment
campus at locations where the signal strength was found low and the results we observed was more than originally we had
with dipole antenna that was being used as a booster .
The below result shows Cantenna results which were taken in our campus area where the signal strength was found
to be 70% initially and testing with the Cantenna gave the height of almost 20% (Figure 4) at the same location with the
same network as we were connected to.
Figure 4: Cantenna Testing
Bandwidth Monitoring module (Figure 5) is basically deal with monitoring network traffic. Traffic in the sense
whenever data is transferred over network cable it get measured. Different application gets data or sends data over network.
Data has some size. This is size can be considered as bandwidth. This module of project keeps watch on data transfer and
measures it and monitors it. This module also shows sent and received data size. Logic behind that is will read LAN adaptor
information continuously. First get the object of LAN card controller class. Then read different data from its object.
Whenever data get transferred data member of this object get changed. And project will show this changed value in loop. It
won’t required any special programming logic. It need only reading data in loop.
Figure 5: Bandwidth Monitor
The Internet Ping command (Figure 6) bounces a small packet off a domain or IP address to test network
communications, and then tells how long the packet took to make the round trip. The Ping command is one of the most
commonly used utilities on the Internet by both people and automated programs for conducting the most basic network test.
Figure 6:Ping
The trace route command (Figure 7) traces the network path of Internet routers that packets take as they are
forwarded from your computer to a destination address. The "length" of the network connection is indicated by the number
of Internet routers in the trace route path. Trace routes can be useful to diagnose slow network connections. For example, if
you can usually reach an Internet site but it is slow today, then a trace route to that site should show you one or more hops
with either long times or marked with "*" indicating the time was really long.
4
5. Manually Designed Wi-Fi Cantenna and its Testing in Real-Time Environment
Figure 7: Trace Route
VII. CONCLUSION
Wireless networks are clear benefits (mobility, flexibility, ease of installation, low maintenance cost, and
scalability) but also has some disadvantages (use demanding equipments for operating parameters such as humidity ,
temperature etc). Smart Antennas can be used to achieve different benefits[14]. The most important is higher network
capacity. It provides better range or coverage by focusing the energy sent out into the cell, multi-path rejection by
minimizing fading and other undesirable effects of multi-path propagation. Smart antennas are a solution to capacity and
interference Problems. Good quality and powerful Wi-Fi signal amplifiers can increase the signal strength threefold.
Bidirectional Wi-Fi signal boosters increase the strength of transmitted, as well as received signals. That is, they work both
ways. They boost signal strength by as much as 600%. Thus the Wi-Fi booster antenna is used in improving the signal
strength by considering the above mentioned points. It is basically effective in locations where there is coverage problem in
case of mobile or when the signal strength becomes less as the distance increases . Thus we conclude that , on testing the
antenna the signal strength reduces with the increase in the distance between the antenna and the Wi-Fi access point.
VIII. FUTURE WORK
It includes designing of manually build booster antenna by following the above mentioned steps and testing the
performance in the real environment where the signal strength is low . Testing of the antenna on the desktop as well as
laptop . Future work also include the manual designing of other booster antennas such as parabolic antenna booster and
cantenna and testing their performance in real environment. Testing comparison with antenna and manual build booster
antenna . The performance of the antenna could be better tested on laptops , where the signal strength could be easily
observed going high or less as the distance increases . The testing of antenna outside the campus area also adds to the
obstruction of the signal by walls or trees.
IX. APPLICATION
• Hot spots similar to those serviced by today’s Wi-Fi systems (airports, hotel lobbies, etc.)
• Academic campuses, in various self-contained areas (quads, auditoriums, cafeterias, etc.)
• Stadiums and arenas, again, which offer self-contained environments.
• Malls and shopping areas, favored by large numbers of younger, Internet-savvy users.
• Mass transportation (trains, etc.) with users looking for interaction and entertainment.
• Enclosed parks and recreation areas.
• Residential homes, supplanting DSL/Cable services
The WI-FI Antenna booster gives increased signal strength at locations where the signal strength goes low as the
distance increases. It also provides us with a cost-effective product as compared to the boosters available at the market. So
this approach is more suitable for the small-scale use .
5
6. Manually Designed Wi-Fi Cantenna and its Testing in Real-Time Environment
REFERENCES
[1]. Marius-Constantin popescu, “New Aspect On Wireless Communication And Network” International Journal Of
Communications Issue 2, Volume 3, 2009.
[2]. Pieter Van Rooyen, “The Wireless World Research Forum And Future Smart Antenna Technology” 2006 IEEE
Ninth International Symposium On Spread Spectrum Techniques And Applications .
[3]. Susmita Das, “Smart Antenna Design For Wireless Communication Using Adaptive Beam-Forming Approach”
2008.
[4]. Chris Loadman, “An Overview Of Adaptive Antenna Technologies For Wireless Communications”, Session A3
Communication Networks And Services Research Conference 2003.
[5]. “Using Mimo-Ofdm Technology To Boost Wireless Lan Performance Today” , Version 1.0 June 1, 2005.
[6]. Richard H. Roy, “Application Of Smart Antenna Technology In Wireless Communication Systems” , 1997 IEEE.
[7]. Alpesh U. Bhobe, “An Overview Of Smart Antenna Technology For Wireless Communication” 2000 IEEE .
[8]. Karim M. Nasr, “Performance Of Different Interpolation Strategies For An OFDM/MMSE Smart Antenna System
In An Indoor WLAN” 2005 IEEE.
[9]. C. Borja, “Impact Of The Antenna Technology And The Antenna Parameters On The Performance Of Mimo
Systems” 2003 IEEE
[10]. Richard H. Roy, “An Overview Of Smart Antenna Technology And Its Application To Wireless Communication
Systems” 1997 IEEE.
[11]. P. Chaipanya, “Enhancement Of Wlan Signal Strength Using Switched-Beam Single Antenna” 2009 IEEE.
[12]. Muzaiyanah hidayab, “Wi-Fi signal propagation at 2.4GHZ” , 2009 IEEE.
[13]. B.Heredia, “ People location system based on Wi-Fi Signal measure”, 2007 IEEE.
[14]. Vrushali.V.Kadu, “An Overview Of Wi-Fi Booster Antenna”, / (Ijaest) International Journal Of Advanced
Engineering Sciences And Technologies Vol No. 2, Issue No. 1, 047 - 051 .
6