This document discusses cognitive radio networks and their advantages over traditional and software defined radio networks. A cognitive radio network is able to sense available spectrum, then adapt its transmission or reception parameters to communicate without interfering with licensed users. It can learn from previous experiences to most efficiently utilize unused spectrum. The cognitive radio cycle involves spectrum sensing, allocation, reconfiguration, and transmission. Cognitive radio networks provide highly reliable communications and efficient spectrum utilization.
IRJET- Performance Comparison of Cognitive Radio Network by Spectrum Sensing ...IRJET Journal
This document discusses and compares different spectrum sensing methods for cognitive radio networks. It focuses on analyzing the performance of energy detection spectrum sensing on various fading channels.
The key points are:
1. Cognitive radio can improve spectrum efficiency by allowing unlicensed secondary users to access spectrum holes not being used by licensed primary users, as long as they do not cause interference.
2. Energy detection is a commonly used spectrum sensing method that does not require prior knowledge of the primary signal. It works by comparing the detected signal energy to a threshold.
3. The performance of an energy detection based cognitive radio system is evaluated on different fading channels like AWGN, Rayleigh, and Nakagami fading channels using receiver
IRJET- Simulating Spectrum Sensing in Cognitive Radio Network using Cyclostat...IRJET Journal
1) The document discusses simulating spectrum sensing in cognitive radio networks using cyclostationary techniques. It aims to detect spectrum holes and classify primary user signals of different modulation schemes.
2) It reviews different spectrum sensing techniques and models/simulates cyclostationary-based sensing. Cyclostationary detection exploits the periodicity in primary user signals to identify their presence and can differentiate modulated signals from noise.
3) The methodology assumes a cognitive radio network with primary and secondary users. It formulates spectrum sensing as a hypothesis test to detect the presence or absence of primary users. It then discusses representing signals using their cyclostationary properties like the cyclic autocorrelation function.
Cognitive Radio: An Emerging trend for better Spectrum UtilizationEditor IJCATR
Due to the rapid development of wireless communications in recent years, the demand on wireless spectrum has been growing dramatically, resulting in the spectrum scarcity problem. Works have shown that the fixed spectrum allocation policy commonly adopted today suffer from the low spectrum utilization problem. Both academic and regulatory bodies have focused on dynamic spectrum access to fully utilize the scarce spectrum resource. Cognitive radio, with the capability to flexibly adapt its parameters, has been proposed as the enabling technology for unlicensed secondary users to dynamically access the licensed spectrum owned by legacy primary users on a negotiated or an opportunistic basis. In this paper we present a volumetric survey on various methods used to adapt changes used in cognitive radio.
This document discusses energy detection for spectrum sensing in cognitive radio using Simulink. It begins with an introduction to cognitive radio and its ability to opportunistically access unused spectrum bands. It then discusses spectrum sensing techniques, focusing on energy detection. Energy detection calculates the energy of the received signal and compares it to a threshold to determine if a primary user is present. The document presents a Simulink model for energy detection and shows output results for scenarios with different numbers of users and threshold values. It concludes that energy detection provides a simple method for cognitive radios to perform spectrum sensing without prior knowledge of primary user signals.
A SURVEY ON DYNAMIC SPECTRUM ACCESS TECHNIQUES IN COGNITIVE RADIOijngnjournal
Wireless networks are characterized by fixed spectrum policy. With increasing demands for wireless communication efficiently using the spectrum resources has become an essential issue. Cognitive radio is a form of wireless communication which is used to sense the spectrum and find the free spectrum. It is used by unlicensed users without causing interference to the licensed user. Cognitive radio with the dynamic spectrum access is key technology which provides the best solution by allowing a group of Secondary users to share the radio spectrum originally allocated to the primary users. Dynamically accessing the unused spectrum is known as dynamic spectrum access (DSA) which becomes a promising approach to increase
the efficiency of spectrum usage. In this paper, DSA models are discussed along with different methods such as game theory based method, a measurement-based model, network coded cognitive control channel, Markovian Queuing model, the Delay performance of threshold policies, fuzzy logic based method and spatio-temporal spectrum management model.
This document provides an overview of cognitive radio and discusses some of the key challenges in deploying cognitive radio networks. It defines cognitive radio as a radio that can be aware of its environment and change its transmission or reception parameters accordingly. The document outlines some of the core capabilities needed for cognitive radios, including flexibility, sensing, learning, and adaptability. It also discusses advantages of cognitive radio like efficient spectrum utilization. Some challenges of deploying cognitive radio networks include developing robust spectrum sensing techniques, designing flexible hardware, addressing legal and security issues, and establishing economic models for spectrum sharing.
Cognitive radio promises to revolutionize wireless communication and spectrum management. It allows unlicensed users to opportunistically access licensed spectrum bands when the licensed users are not actively using it. This helps solve the problem of spectrum scarcity by improving utilization efficiency. However, realizing cognitive radio faces many technical, economic and legal challenges. Key challenges include developing sensing techniques to avoid interference, establishing spectrum sharing protocols, and reforming policies to allow dynamic spectrum access while protecting licensed users. Overcoming these challenges could provide benefits like ubiquitous connectivity and new wireless applications.
This thesis examines spectrum sensing techniques for cognitive radios. It provides background on cognitive radios and their role in more efficiently utilizing allocated spectrum bands. The thesis describes challenges for spectrum sensing, such as multipath fading and shadowing. It then analyzes several key spectrum sensing techniques, including matched filter detection, and discusses cooperative spectrum sensing where multiple cognitive radios collaborate to detect spectrum holes. The goal is to thoroughly study approaches for cognitive radios to reliably sense spectrum usage without interfering with licensed users.
IRJET- Performance Comparison of Cognitive Radio Network by Spectrum Sensing ...IRJET Journal
This document discusses and compares different spectrum sensing methods for cognitive radio networks. It focuses on analyzing the performance of energy detection spectrum sensing on various fading channels.
The key points are:
1. Cognitive radio can improve spectrum efficiency by allowing unlicensed secondary users to access spectrum holes not being used by licensed primary users, as long as they do not cause interference.
2. Energy detection is a commonly used spectrum sensing method that does not require prior knowledge of the primary signal. It works by comparing the detected signal energy to a threshold.
3. The performance of an energy detection based cognitive radio system is evaluated on different fading channels like AWGN, Rayleigh, and Nakagami fading channels using receiver
IRJET- Simulating Spectrum Sensing in Cognitive Radio Network using Cyclostat...IRJET Journal
1) The document discusses simulating spectrum sensing in cognitive radio networks using cyclostationary techniques. It aims to detect spectrum holes and classify primary user signals of different modulation schemes.
2) It reviews different spectrum sensing techniques and models/simulates cyclostationary-based sensing. Cyclostationary detection exploits the periodicity in primary user signals to identify their presence and can differentiate modulated signals from noise.
3) The methodology assumes a cognitive radio network with primary and secondary users. It formulates spectrum sensing as a hypothesis test to detect the presence or absence of primary users. It then discusses representing signals using their cyclostationary properties like the cyclic autocorrelation function.
Cognitive Radio: An Emerging trend for better Spectrum UtilizationEditor IJCATR
Due to the rapid development of wireless communications in recent years, the demand on wireless spectrum has been growing dramatically, resulting in the spectrum scarcity problem. Works have shown that the fixed spectrum allocation policy commonly adopted today suffer from the low spectrum utilization problem. Both academic and regulatory bodies have focused on dynamic spectrum access to fully utilize the scarce spectrum resource. Cognitive radio, with the capability to flexibly adapt its parameters, has been proposed as the enabling technology for unlicensed secondary users to dynamically access the licensed spectrum owned by legacy primary users on a negotiated or an opportunistic basis. In this paper we present a volumetric survey on various methods used to adapt changes used in cognitive radio.
This document discusses energy detection for spectrum sensing in cognitive radio using Simulink. It begins with an introduction to cognitive radio and its ability to opportunistically access unused spectrum bands. It then discusses spectrum sensing techniques, focusing on energy detection. Energy detection calculates the energy of the received signal and compares it to a threshold to determine if a primary user is present. The document presents a Simulink model for energy detection and shows output results for scenarios with different numbers of users and threshold values. It concludes that energy detection provides a simple method for cognitive radios to perform spectrum sensing without prior knowledge of primary user signals.
A SURVEY ON DYNAMIC SPECTRUM ACCESS TECHNIQUES IN COGNITIVE RADIOijngnjournal
Wireless networks are characterized by fixed spectrum policy. With increasing demands for wireless communication efficiently using the spectrum resources has become an essential issue. Cognitive radio is a form of wireless communication which is used to sense the spectrum and find the free spectrum. It is used by unlicensed users without causing interference to the licensed user. Cognitive radio with the dynamic spectrum access is key technology which provides the best solution by allowing a group of Secondary users to share the radio spectrum originally allocated to the primary users. Dynamically accessing the unused spectrum is known as dynamic spectrum access (DSA) which becomes a promising approach to increase
the efficiency of spectrum usage. In this paper, DSA models are discussed along with different methods such as game theory based method, a measurement-based model, network coded cognitive control channel, Markovian Queuing model, the Delay performance of threshold policies, fuzzy logic based method and spatio-temporal spectrum management model.
This document provides an overview of cognitive radio and discusses some of the key challenges in deploying cognitive radio networks. It defines cognitive radio as a radio that can be aware of its environment and change its transmission or reception parameters accordingly. The document outlines some of the core capabilities needed for cognitive radios, including flexibility, sensing, learning, and adaptability. It also discusses advantages of cognitive radio like efficient spectrum utilization. Some challenges of deploying cognitive radio networks include developing robust spectrum sensing techniques, designing flexible hardware, addressing legal and security issues, and establishing economic models for spectrum sharing.
Cognitive radio promises to revolutionize wireless communication and spectrum management. It allows unlicensed users to opportunistically access licensed spectrum bands when the licensed users are not actively using it. This helps solve the problem of spectrum scarcity by improving utilization efficiency. However, realizing cognitive radio faces many technical, economic and legal challenges. Key challenges include developing sensing techniques to avoid interference, establishing spectrum sharing protocols, and reforming policies to allow dynamic spectrum access while protecting licensed users. Overcoming these challenges could provide benefits like ubiquitous connectivity and new wireless applications.
This thesis examines spectrum sensing techniques for cognitive radios. It provides background on cognitive radios and their role in more efficiently utilizing allocated spectrum bands. The thesis describes challenges for spectrum sensing, such as multipath fading and shadowing. It then analyzes several key spectrum sensing techniques, including matched filter detection, and discusses cooperative spectrum sensing where multiple cognitive radios collaborate to detect spectrum holes. The goal is to thoroughly study approaches for cognitive radios to reliably sense spectrum usage without interfering with licensed users.
The document discusses performance evaluation of local and cooperative spectrum sensing techniques in cognitive radio. It implements energy detection, one-order and two-order cyclostationary feature detection as local spectrum sensing techniques. It also implements cooperative spectrum sensing using an energy detector across multiple cognitive radios. Further, it presents a software-defined approach to dynamic spectrum management and sharing between primary and secondary users. Simulation results demonstrating the receiver operating characteristics of the techniques are also included.
This document provides a summary of a term paper on cognitive radio. It discusses key topics such as what cognitive radio is, its advantages over static spectrum allocation, key drivers for cognitive radio like dynamic spectrum access and cognitive radio networks, challenges to deployment including legal hurdles, security issues, and technology hurdles related to spectrum sensing. Promising applications of cognitive radio mentioned include emergency services, low cost internet access, and new services enabled by intelligent radio-based advertising.
IRJET- Data Transmission for Proximity Devices using Ultrasonic Sound WavesIRJET Journal
This document discusses using ultrasonic sound waves to transmit data between devices for proximity networking applications. It proposes modulating ultrasound in a way that allows for fast, low error data transfer imperceptible to users. The system aims to provide authentication, privacy and control for applications like text chat, online shopping and IOT device monitoring. It describes challenges faced in achieving an effective data rate given limitations of phone speakers/microphones. Results showed text commands could be transferred without wires by enhancing the frequency response of ultrasound between connected devices.
In this prentation cognitive radio is described, discussed
and compared with software defined radio (SDR). The two types
of cognitive radio are presented and examples on both spectrum
interweave and spectrum underlay cognitive radio antenna systems
are detailed. Reconfigurable filtennas are proposed as communicating
antennas in a MIMO setting for both cases of cognitive
radio. The benefits of resorting to filtennas as well as toMIMO
configuration is shown and discussed herein. The various antenna
examples are designed, tested and compared with each other. Conclusions
are drawn based on the presented results.
1) The document discusses smart antennas for WiMAX radio systems. Smart antennas can sense their environment and adjust their gain in different directions, increasing traffic capacity and quality of service.
2) Two main types of smart antenna configurations are discussed: switched beam arrays and adaptive arrays. Switched beam arrays form fixed beams toward different directions, while adaptive arrays use signal processing to dynamically steer beams toward desired users and place nulls toward interferers.
3) The MUSIC algorithm for direction of arrival estimation is described. MUSIC exploits the noise eigenvector subspace to provide unbiased estimates of the number and angles of incoming signals. It assumes uncorrelated noise and may be used to estimate directions of arrival to implement adaptive
Cognitive radio is a form of software-defined radio that can be used to address the spectrum crunch by detecting unused spectrum ("spectrum holes") and transmitting on those frequencies without interfering with the licensed users. It works by constantly sensing its operating environment and adapting its transmission parameters, such as frequency band or power level. This allows cognitive radios to opportunistically use vacant spectrum while avoiding occupied bands. Some challenges to the technology include developing specialized hardware, synchronization between devices, and preventing security vulnerabilities or false interference readings.
Spectrum Sensing in Cognitive Radio Networks : QoS Considerations csandit
This document discusses spectrum sensing methods in cognitive radio networks and their impact on quality of service (QoS). It analyzes several spectrum sensing methods including energy detection, covariance-based detection, cyclostationarity feature detection, correlation detection, radio identification based sensing, and matched filtering. These methods are categorized as requiring no prior information, requiring prior information, or being based on cooperation between secondary users. The document notes that imperfect spectrum sensing can degrade QoS for both primary and secondary users. It also discusses how increasing sensing time and frequency improves detection of primary users but reduces data transmission time and degrades QoS for secondary users.
Cognitive Radio : Emerging Business Toward an Efficiently Smart Era of ICTNurmaya Widuri
Cognitive Radio is a hot issue in wireless technology. This is ultimately new wave of how radio technolgy communicate through spectrum effeciency. Furthermore, this new big thing bring a new wave of future ICT business lanscape toward efficiently smart era of ICT.
The document discusses enabling innovative wireless solutions through the design of wireless sensor networks for spectrum sensing and cognitive communication (CROPS project). It outlines the challenges of dynamic spectrum access and the need for knowledge of spectrum availability. The CROPS project objectives are to design spectrum sensing wireless sensor networks that address spectrum sensing requirements, sensor data fusion, cooperative transmission, and multihop communication, as well as sensing hardware design.
Implementation of Wireless Communication using Adaptive Beamforming of Smart ...IOSR Journals
Abstract : As the growing demand for mobile communications is constantly increasing, the need for better coverage, improved capacity, and higher transmission quality rises. Thus, a more efficient use of the radio spectrum is required. A smart antenna system is capable of efficiently utilizing the radio spectrum and is an effective solution to the present wireless system problems while achieving reliable and robust high-speed, high-data-rate transmission. Smart antenna technology offer significantly improved solution to reduce interference level and improve system capacity. Smart antenna technology attempts to address this problem via advanced signal processing technology called beamforming. Adaptive beamforming is used for enhancing a desired signal while suppressing noise and interference at the output of an array of sensors. , in this paper work, a robust adaptive beamforming algorithm using smart antenna base station system, is to investigated its performance in presence of multipath components and multiple users .The capability of smart antenna and adaptive antenna easily employable to cognitive radio and OFDM system. Keywords - Smart/adaptive antenna, beamforming, DSP, OFDM
This document analyzes and compares the performance of the AODV and DSDV routing protocols in vehicular ad hoc networks (VANETs) through simulation. It first provides background on VANETs and describes the AODV and DSDV protocols. It then discusses the simulators MOVE, SUMO, and NS-2 that were used to generate mobility models and simulate the routing protocols under different network scenarios varying the number of nodes and connections. The document aims to evaluate the behavior and effectiveness of the reactive AODV protocol versus the proactive DSDV protocol in VANET environments.
An overview of cognitive radio, comparison of cognitive radio vs. conventional radio, real-world applications for cognitive radio networks, how cognitive radios improve spectrum efficiency and address the wireless spectrum shortage.
Keith Nolan - Use Of Cognitive Radio To Improve Spectrum Usage Efficiency And...Keith Nolan
Keith Nolan - spectrum, regulatory, technical and market issues surrounding the use of cognitive radio to improve spectrum usage efficiency and data capacity, IEEE VTS UKRI meeting, July 2012, Dublin, Ireland
RedTacton is a new technology developed by NTT that enables communication through the human body using very weak electric fields on the skin's surface. It allows for a "Human Area Network" where electronic devices can connect and exchange data when touching different parts of the body. RedTacton uses a photonic electric field sensor combining an electro-optic crystal and laser to detect tiny fluctuations in the electric field caused by transmitting data. This powers duplex communication at speeds up to 10 Mbps. Potential applications include instantly sharing files between devices with a handshake, personalizing devices with a touch, and triggering alarms if the wrong medicine is touched.
Enhanced signal detection slgorithm using trained neural network for cognitiv...IJECEIAES
Over the past few years, Cognitive Radio has become an important research area in the field of wireless communications. It can play an important role in dynamic spectrum management and interference identification. There are many spectrum sensing techniques proposed in literature for cognitive radio, but all those techniques detect only presence or absence of the primary user in the designated band and do not give any information about the used modulation scheme. In certain applications, in cognitive radio receiver, it is necessary to identify the modulation type of the signal so that the receiver parameters can be adjusted accordingly. Most of the modulated signals exhibit the property of Cyclostationarity that can be used for the purpose of correct detection of primary user and the modulation type. In this paper, we have proposed an enhanced signal detection algorithm for cognitive radio receiver which makes use of cyclostationarity property of the modulated signal to exactly detect, the modulation type of the received signal using a trained neural network. The algorithm gives better accuracy of signal detection even in low SNR conditions. The use of a trained neural network makes it more flexible and extendible for future applications
La compañía Walt Disney es el mayor conglomerado de medios de comunicación y entretenimiento del mundo, fundada en 1923 por Walt Disney y Ub Iwerks. Ahora opera parques temáticos como Disneyland y Walt Disney World, así como cruceros y resorts en varios países.
The document discusses the importance of networking for career development. It provides tips for building relationships, including viewing networking as a two-way street and making long-term investments of time. Advice is given for identifying potential connections through groups like family, friends, alumni and professional associations. Examples of social media platforms for networking are listed. An exercise is described to practice introducing oneself in different scenarios. The importance of follow up is stressed.
Optimize Utility in Computing-Based Manufacturing Systems Using Service Model...AM Publications
This document discusses optimizing utility in computing-based manufacturing systems using service models and development models. It proposes an automatic cloud migration system to address issues with existing manual migration processes between source and destination servers in manufacturing systems. This includes utilizing cloud deployment models and services to migrate data and applications between servers in a faster, less error-prone manner. It describes the existing levels of manufacturing units, benefits of the automated approach over manual migration, deployment details involving configuration management databases and intuitive user interfaces, and concludes the automatic migration would improve speed, reduce expert workload, and add functionality like auditing and restore points.
Implementation Secure Authentication Using Elliptic Curve CryptographyAM Publications
Elliptic curve cryptography is the most efficient public key encryption scheme based on the elliptic curve concepts that
can be used to create faster, smaller, and efficient cryptographic keys. As a use of network increase for critical transaction, so
huge damages are caused by intrusion attacks hence there is the need of computer network security. To protect network against
various active and passive attack, various technique have been suggested. Mobile devices have many differences in their
capabilities, computational powers and security requirements. The security of mobile communication has stopped the list of
concerns for mobile phone users. Confidentiality, Authentication, Integrity and Non-repudiation are required security services for mobile communication.
Industry Based Vocational Higher Education Management Model (IVHEMM) On Engin...AM Publications
Industrial participation in an educational development remains low. This case caused by the absence of clear and detailed provisions of the Government about industrial involvement in the development of vocational higher education. There are several factors that influence the success of a cooperation program in vocational higher education with industry, such as : discrepancy of competency which is produced by higher education with the needs of industry, the lack of industry concern on education, the implementation of quality culture, the application of ICT technology, poor attitude of entrepreneurs, and the work of higher education which do not have commercial value. The research objective is to develop a vocational higher education management model on engineering industry. Preliminary studies conducted at several vocational universities namely Semarang State Polytechnic, ATMI Polytechnic, Bandung Manufacture Polytechnic, Ceper Manufacture Polytechnic and Academy of PIKA. The method of this research apply R & D (Research and Development) with the phases of conducting some preliminary research, developing and testing the product of vocational higher education management model research on engineering industry. Results of the research formulate vocational higher education management model on engineering and guidebooks. The novelty of this study is the importance of improving management performance in vocational higher education. The factors that influence the performance improvement of vocational education management are (1) the level of better industrial relations; (2) the application of quality culture in vocational higher education, (3) strategic technological adaptation to the environment, and (4) the improvement of the quality of education through the implementation of Total Quality Management Education.
The document discusses performance evaluation of local and cooperative spectrum sensing techniques in cognitive radio. It implements energy detection, one-order and two-order cyclostationary feature detection as local spectrum sensing techniques. It also implements cooperative spectrum sensing using an energy detector across multiple cognitive radios. Further, it presents a software-defined approach to dynamic spectrum management and sharing between primary and secondary users. Simulation results demonstrating the receiver operating characteristics of the techniques are also included.
This document provides a summary of a term paper on cognitive radio. It discusses key topics such as what cognitive radio is, its advantages over static spectrum allocation, key drivers for cognitive radio like dynamic spectrum access and cognitive radio networks, challenges to deployment including legal hurdles, security issues, and technology hurdles related to spectrum sensing. Promising applications of cognitive radio mentioned include emergency services, low cost internet access, and new services enabled by intelligent radio-based advertising.
IRJET- Data Transmission for Proximity Devices using Ultrasonic Sound WavesIRJET Journal
This document discusses using ultrasonic sound waves to transmit data between devices for proximity networking applications. It proposes modulating ultrasound in a way that allows for fast, low error data transfer imperceptible to users. The system aims to provide authentication, privacy and control for applications like text chat, online shopping and IOT device monitoring. It describes challenges faced in achieving an effective data rate given limitations of phone speakers/microphones. Results showed text commands could be transferred without wires by enhancing the frequency response of ultrasound between connected devices.
In this prentation cognitive radio is described, discussed
and compared with software defined radio (SDR). The two types
of cognitive radio are presented and examples on both spectrum
interweave and spectrum underlay cognitive radio antenna systems
are detailed. Reconfigurable filtennas are proposed as communicating
antennas in a MIMO setting for both cases of cognitive
radio. The benefits of resorting to filtennas as well as toMIMO
configuration is shown and discussed herein. The various antenna
examples are designed, tested and compared with each other. Conclusions
are drawn based on the presented results.
1) The document discusses smart antennas for WiMAX radio systems. Smart antennas can sense their environment and adjust their gain in different directions, increasing traffic capacity and quality of service.
2) Two main types of smart antenna configurations are discussed: switched beam arrays and adaptive arrays. Switched beam arrays form fixed beams toward different directions, while adaptive arrays use signal processing to dynamically steer beams toward desired users and place nulls toward interferers.
3) The MUSIC algorithm for direction of arrival estimation is described. MUSIC exploits the noise eigenvector subspace to provide unbiased estimates of the number and angles of incoming signals. It assumes uncorrelated noise and may be used to estimate directions of arrival to implement adaptive
Cognitive radio is a form of software-defined radio that can be used to address the spectrum crunch by detecting unused spectrum ("spectrum holes") and transmitting on those frequencies without interfering with the licensed users. It works by constantly sensing its operating environment and adapting its transmission parameters, such as frequency band or power level. This allows cognitive radios to opportunistically use vacant spectrum while avoiding occupied bands. Some challenges to the technology include developing specialized hardware, synchronization between devices, and preventing security vulnerabilities or false interference readings.
Spectrum Sensing in Cognitive Radio Networks : QoS Considerations csandit
This document discusses spectrum sensing methods in cognitive radio networks and their impact on quality of service (QoS). It analyzes several spectrum sensing methods including energy detection, covariance-based detection, cyclostationarity feature detection, correlation detection, radio identification based sensing, and matched filtering. These methods are categorized as requiring no prior information, requiring prior information, or being based on cooperation between secondary users. The document notes that imperfect spectrum sensing can degrade QoS for both primary and secondary users. It also discusses how increasing sensing time and frequency improves detection of primary users but reduces data transmission time and degrades QoS for secondary users.
Cognitive Radio : Emerging Business Toward an Efficiently Smart Era of ICTNurmaya Widuri
Cognitive Radio is a hot issue in wireless technology. This is ultimately new wave of how radio technolgy communicate through spectrum effeciency. Furthermore, this new big thing bring a new wave of future ICT business lanscape toward efficiently smart era of ICT.
The document discusses enabling innovative wireless solutions through the design of wireless sensor networks for spectrum sensing and cognitive communication (CROPS project). It outlines the challenges of dynamic spectrum access and the need for knowledge of spectrum availability. The CROPS project objectives are to design spectrum sensing wireless sensor networks that address spectrum sensing requirements, sensor data fusion, cooperative transmission, and multihop communication, as well as sensing hardware design.
Implementation of Wireless Communication using Adaptive Beamforming of Smart ...IOSR Journals
Abstract : As the growing demand for mobile communications is constantly increasing, the need for better coverage, improved capacity, and higher transmission quality rises. Thus, a more efficient use of the radio spectrum is required. A smart antenna system is capable of efficiently utilizing the radio spectrum and is an effective solution to the present wireless system problems while achieving reliable and robust high-speed, high-data-rate transmission. Smart antenna technology offer significantly improved solution to reduce interference level and improve system capacity. Smart antenna technology attempts to address this problem via advanced signal processing technology called beamforming. Adaptive beamforming is used for enhancing a desired signal while suppressing noise and interference at the output of an array of sensors. , in this paper work, a robust adaptive beamforming algorithm using smart antenna base station system, is to investigated its performance in presence of multipath components and multiple users .The capability of smart antenna and adaptive antenna easily employable to cognitive radio and OFDM system. Keywords - Smart/adaptive antenna, beamforming, DSP, OFDM
This document analyzes and compares the performance of the AODV and DSDV routing protocols in vehicular ad hoc networks (VANETs) through simulation. It first provides background on VANETs and describes the AODV and DSDV protocols. It then discusses the simulators MOVE, SUMO, and NS-2 that were used to generate mobility models and simulate the routing protocols under different network scenarios varying the number of nodes and connections. The document aims to evaluate the behavior and effectiveness of the reactive AODV protocol versus the proactive DSDV protocol in VANET environments.
An overview of cognitive radio, comparison of cognitive radio vs. conventional radio, real-world applications for cognitive radio networks, how cognitive radios improve spectrum efficiency and address the wireless spectrum shortage.
Keith Nolan - Use Of Cognitive Radio To Improve Spectrum Usage Efficiency And...Keith Nolan
Keith Nolan - spectrum, regulatory, technical and market issues surrounding the use of cognitive radio to improve spectrum usage efficiency and data capacity, IEEE VTS UKRI meeting, July 2012, Dublin, Ireland
RedTacton is a new technology developed by NTT that enables communication through the human body using very weak electric fields on the skin's surface. It allows for a "Human Area Network" where electronic devices can connect and exchange data when touching different parts of the body. RedTacton uses a photonic electric field sensor combining an electro-optic crystal and laser to detect tiny fluctuations in the electric field caused by transmitting data. This powers duplex communication at speeds up to 10 Mbps. Potential applications include instantly sharing files between devices with a handshake, personalizing devices with a touch, and triggering alarms if the wrong medicine is touched.
Enhanced signal detection slgorithm using trained neural network for cognitiv...IJECEIAES
Over the past few years, Cognitive Radio has become an important research area in the field of wireless communications. It can play an important role in dynamic spectrum management and interference identification. There are many spectrum sensing techniques proposed in literature for cognitive radio, but all those techniques detect only presence or absence of the primary user in the designated band and do not give any information about the used modulation scheme. In certain applications, in cognitive radio receiver, it is necessary to identify the modulation type of the signal so that the receiver parameters can be adjusted accordingly. Most of the modulated signals exhibit the property of Cyclostationarity that can be used for the purpose of correct detection of primary user and the modulation type. In this paper, we have proposed an enhanced signal detection algorithm for cognitive radio receiver which makes use of cyclostationarity property of the modulated signal to exactly detect, the modulation type of the received signal using a trained neural network. The algorithm gives better accuracy of signal detection even in low SNR conditions. The use of a trained neural network makes it more flexible and extendible for future applications
La compañía Walt Disney es el mayor conglomerado de medios de comunicación y entretenimiento del mundo, fundada en 1923 por Walt Disney y Ub Iwerks. Ahora opera parques temáticos como Disneyland y Walt Disney World, así como cruceros y resorts en varios países.
The document discusses the importance of networking for career development. It provides tips for building relationships, including viewing networking as a two-way street and making long-term investments of time. Advice is given for identifying potential connections through groups like family, friends, alumni and professional associations. Examples of social media platforms for networking are listed. An exercise is described to practice introducing oneself in different scenarios. The importance of follow up is stressed.
Optimize Utility in Computing-Based Manufacturing Systems Using Service Model...AM Publications
This document discusses optimizing utility in computing-based manufacturing systems using service models and development models. It proposes an automatic cloud migration system to address issues with existing manual migration processes between source and destination servers in manufacturing systems. This includes utilizing cloud deployment models and services to migrate data and applications between servers in a faster, less error-prone manner. It describes the existing levels of manufacturing units, benefits of the automated approach over manual migration, deployment details involving configuration management databases and intuitive user interfaces, and concludes the automatic migration would improve speed, reduce expert workload, and add functionality like auditing and restore points.
Implementation Secure Authentication Using Elliptic Curve CryptographyAM Publications
Elliptic curve cryptography is the most efficient public key encryption scheme based on the elliptic curve concepts that
can be used to create faster, smaller, and efficient cryptographic keys. As a use of network increase for critical transaction, so
huge damages are caused by intrusion attacks hence there is the need of computer network security. To protect network against
various active and passive attack, various technique have been suggested. Mobile devices have many differences in their
capabilities, computational powers and security requirements. The security of mobile communication has stopped the list of
concerns for mobile phone users. Confidentiality, Authentication, Integrity and Non-repudiation are required security services for mobile communication.
Industry Based Vocational Higher Education Management Model (IVHEMM) On Engin...AM Publications
Industrial participation in an educational development remains low. This case caused by the absence of clear and detailed provisions of the Government about industrial involvement in the development of vocational higher education. There are several factors that influence the success of a cooperation program in vocational higher education with industry, such as : discrepancy of competency which is produced by higher education with the needs of industry, the lack of industry concern on education, the implementation of quality culture, the application of ICT technology, poor attitude of entrepreneurs, and the work of higher education which do not have commercial value. The research objective is to develop a vocational higher education management model on engineering industry. Preliminary studies conducted at several vocational universities namely Semarang State Polytechnic, ATMI Polytechnic, Bandung Manufacture Polytechnic, Ceper Manufacture Polytechnic and Academy of PIKA. The method of this research apply R & D (Research and Development) with the phases of conducting some preliminary research, developing and testing the product of vocational higher education management model research on engineering industry. Results of the research formulate vocational higher education management model on engineering and guidebooks. The novelty of this study is the importance of improving management performance in vocational higher education. The factors that influence the performance improvement of vocational education management are (1) the level of better industrial relations; (2) the application of quality culture in vocational higher education, (3) strategic technological adaptation to the environment, and (4) the improvement of the quality of education through the implementation of Total Quality Management Education.
On-line IDACS for Embedded Real Time ApplicationAM Publications
Design of on-line embedded web server is a challenging part of many embedded and real time data acquisition and control system applications. The World Wide Web is a global system of interconnected computer networks that use the standard Internet Protocol Suite (TCP/IP) to serve billion of users worldwide and allows the user to interface many real time embedded applications like data acquisition, Industrial automations and safety measures etc,. This paper approached towards the design and development of on-line Interactive Data Acquisition and Control System (IDACS) using ARM based embedded web server. It can be a network, intelligent and digital distributed control system. Single chip IDACS method improves the processing capability of a system and overcomes the problem of poor real time and reliability. This system uses ARM9 Processor portability with Real Time Linux operating system (RTLinux RTOS) it makes the system more real time and handling various processes based on multi-tasking and reliable scheduling mechanisms. Web server application is ported into an ARM processor using embedded ‘C’ language. Web pages are written by Hyper text markup language (HTML); it is beneficial for real time IDACS, Mission critical applications, ATM networks and more. Mission critical applications, ATM networks and more.
Enhancement of Map Function Image Processing System Using DHRF Algorithm on B...AM Publications
Cloud computing is the concept of distributing a work and also processing the same work over the internet. Cloud
computing is called as service on demand. It is always available on the internet in Pay and Use mode. Processing of the Big
Data takes more time to compute MRI and DICOM data. The processing of hard tasks like this can be solved by using the
concept of MapReduce. MapReduce function is a concept of Map and Reduce functions. Map is the process of splitting or
dividing data. Reduce function is the process of integrating the output of the Map’s input to produce the result. The Map
function does two various image processing techniques to process the input data. Java Advanced Imaging (JAI) is introduced
in the map function in this proposed work. The processed intermediate data of the Map function is sent to the Reduce function
for the further process. The Dynamic Handover Reduce Function (DHRF) algorithm is introduced in the reduce function in
this work. This algorithm is implemented in the Reduce function to reduce the waiting time while processing the intermediate
data. The DHRF algorithm gives the final output by processing the Reduce function. The enhanced MapReduce concept and
proposed optimized algorithm is made to work on Euca2ool (a Cloud tool) to produce an effective and better output when
compared with the previous work in the field of Cloud Computing and Big Data.
Trabajo de informatica geison cuasapaz y william narváezarturocuasapaz
El documento habla sobre hackers y crackers. Menciona que Geison Cuasapaz y William Narváez son estudiantes del primer curso de la carrera de Informática en la Universidad Politécnica Estatal del Carchi. El tema que tratan es la diferencia entre hackers y crackers.
Slide 1 WestCal Political Science 5 Western Political Thought 2016WestCal Academy
Political Science 5 - Western Political Thought provides an overall perspective of major political movements of history from the rising of Egyptian, Greek and Roman Empires to Fascism and Communism as seen by great political thinkers from Plato, Aristotle, and St. Augustine, Machiavelli, Marx, and Lenin. Students will analyze the most important ideas and theories that have been developed from the time of the ancient Greeks to the present day. Students will learn that the American Founding Fathers designed a viable representative government by first dedicating themselves to careful study of the political philosophy of Europeans, with particular attention given to British political thinkers from the 16th and 17th century. The founding fathers focused primarily on the natural rights of man, which in turn varied according to the individual philosopher studied. Over the course of their study, the founding fathers openly discussed their opinions with one another so as to properly bring forth differing views in order to prudently construct a government that would protect individual liberty, as well as determine what was required of government to protect civil liberties. The class is taught from the perspective of industry professionals with knowledge of how classical and modern political continues to influence American government. Students will learn of multiple career options relating to the field of political science.
Classification Of Power System StabilityAravind Shaji
The Slide Deals With Power System Stability. Contents Include
Power System Stability Overview
Power System Stability: A Proposed Definition
Need of Stability Classification
Classification of stability
Power System Stability Classification
Rotor Angle Stability
Voltage Stability
Frequency Stability
Rotor Angle Stability vs. Voltage Stability
References
Cognitive radio is an enhancement of software defined radio that allows radios to sense their environment and change operating parameters accordingly. It was first proposed in 1998 as a way to more efficiently utilize limited radio frequency spectrum. A cognitive radio can sense available portions of spectrum, then dynamically use those available channels while avoiding occupied ones. This allows for greater spectrum utilization and more flexible interoperability between different wireless technologies. However, cognitive radio also faces significant hardware and software challenges around dynamic reconfiguration, interference avoidance, and security that must be addressed for it to be fully realized.
This document discusses the role of cognitive radio technology in 4G communications. It begins with an abstract that introduces cognitive radio as the key enabling technology for next generation networks. It then reviews research being done on cognitive radio and 4G technologies. The main possibilities of implementing cognitive radios in 4G communication systems are surveyed, including how networks like IEEE 802.22 and WiMAX extensions can enhance 4G performance using cognitive technologies.
A cognitive radio and dynamic spectrum access – a studyijngnjournal
A basic problem facing the future in wireless systems is where to find suitable spectrum bands to fulfill the
demand of future services. While all of the radio spectrum is allocated to different services, applications
and users, observation show that usage of the spectrum is actually quite low. To overcome this problem
and improve the spectrum utilization, cognitive radio concept has been evolved. Wireless communication,
in which a transmitter and receiver can detect intelligently communication channels that are in use and
those which are not in use are known as Cognitive Radio, and it can move to unused channels. This makes
possible the use of available radio frequency spectrum while minimizing interference with other users. CRs
must have the capability to learn and adapt their wireless transmission according to the surrounding radio
environment. The application of Artificial Intelligence approaches in the Cognitive Radio is very promising
since they have a great importance for the implementation of Cognitive Radio networks architecture.
Dynamic spectrum access is a promising approach to make less severe the spectrum scarcity that wireless
communications face now. It aims at reusing sparsely occupied frequency bands and does not interfere to
the actual licensees. This paper is a review and comparison of different DSA models and methods.
A Cognitive Radio And Dynamic Spectrum Access – A Studyjosephjonse
A basic problem facing the future in wireless systems is where to find suitable spectrum bands to fulfill the demand of future services. While all of the radio spectrum is allocated to different services, applications and users, observation show that usage of the spectrum is actually quite low. To overcome this problem and improve the spectrum utilization, cognitive radio concept has been evolved. Wireless communication, in which a transmitter and receiver can detect intelligently communication channels that are in use and those which are not in use are known as Cognitive Radio, and it can move to unused channels. This makes possible the use of available radio frequency spectrum while minimizing interference with other users. CRs must have the capability to learn and adapt their wireless transmission according to the surrounding radio environment. The application of Artificial Intelligence approaches in the Cognitive Radio is very promising since they have a great importance for the implementation of Cognitive Radio networks architecture. Dynamic spectrum access is a promising approach to make less severe the spectrum scarcity that wireless communications face now. It aims at reusing sparsely occupied frequency bands and does not interfere to the actual licensees. This paper is a review and comparison of different DSA models and methods.
Methods for Detecting Energy and Signals in Cognitive Radio: A ReviewIRJET Journal
This document provides a review of methods for detecting energy and signals in cognitive radio. It begins with an abstract that introduces cognitive radio technology and its ability to dynamically access radio spectrum. It then discusses the principles of cognitive radio, including spectrum sensing, management, and sharing. The document reviews literature on various energy detection methods and techniques. It describes cognitive radio stations and networks, explaining how cognitive radios can sense spectrum usage and select channels to improve efficiency. The review identifies energy detection as a common sensing method due to its simplicity but notes limitations in detection performance. It surveys recent research on enhanced energy detection techniques aimed at improving performance while maintaining low complexity.
Performance Analysis of Cognitive Radio for Wi-Fi Signals Using Cyclostationa...IJERA Editor
The need for radio spectrum usage is increasing day by day with recent advancements in wireless system. But there is limited amount of spectrum available. So that for solving this problem Cognitive Radio (CR) is used for purpose of the spectrum utilization properly. Basically the Licensed users use the licensed bands but the unlicensed users should always check spectrum with the help of CR technology. The main aim of cognitive radio is to sense the spectrum continuously. In this paper, we have provided the proposal that how the capacity of the system can be increased by reuse the unused licensed band by simulating a Cognitive radio system. The secondary users can occupy free space (spectrum holes) and also licensed bands by continuously monitoring the spectrum. The requirements of cognitive radio systems will be investigated by considering spectrum sensing techniques. To achieve this, a Cyclostationary Spectrum Sensing technique is studied and applied to detect OFDM signals in a noisy environment. The results are obtained for the applications employed in high frequency, such as, Wi-Fi.
This document provides an introduction to cognitive radio. It defines cognitive radio as an intelligent wireless communication system that is aware of its surrounding environment and can learn and adapt to statistical variations in input stimuli in real-time. The key goals are highly reliable communication and efficient utilization of the radio spectrum. It discusses three fundamental cognitive tasks: radio-scene analysis to detect spectrum holes, channel identification to estimate channel states, and transmit power control and dynamic spectrum management. These three tasks form a cognitive cycle between the transmitter and receiver to achieve the goals of cognitive radio.
IRJET- Research on Dynamic Spectrum AllocationIRJET Journal
This document summarizes research on dynamic spectrum allocation using cognitive radio. It first provides background on the increasing interference in wireless networks due to the growing number of devices operating in unlicensed bands like the ISM band. It then introduces cognitive radio as a potential solution, which can detect available channels and adapt transmission accordingly to allow more concurrent devices. It discusses the main challenges for cognitive radios in not interfering with licensed users. The document reviews several papers on related topics like online spectrum allocation algorithms and surveys of spectrum management techniques. It also describes common spectrum sensing methods used by cognitive radios to detect spectrum holes like matched filtering, cyclostationary detection, and energy detection. Results are presented on performance metrics like end-to-end delay
This document provides a summary of a term paper on cognitive radio. It discusses key topics such as:
- What cognitive radio is and its main features of intelligent awareness and reconfigurability.
- The inefficiencies of current static spectrum allocation and how cognitive radio can help address spectrum scarcity issues.
- Drivers for cognitive radio like dynamic spectrum access and cognitive radio networks.
- Challenges to deploying cognitive radio like legal hurdles, security issues, and technology hurdles related to spectrum sensing.
- Promising applications of cognitive radio in areas like emergency services, internet access, and rural connectivity.
This document provides a summary of a term paper on cognitive radio. It discusses key topics such as:
- What cognitive radio is and its main features of intelligent awareness and reconfigurability.
- The inefficiencies of current static spectrum allocation and how cognitive radio can help address spectrum scarcity issues.
- Drivers for cognitive radio like dynamic spectrum access and cognitive radio networks.
- Challenges to deploying cognitive radio like legal hurdles, security issues, and technology hurdles related to spectrum sensing.
- Promising applications of cognitive radio in areas like emergency services, internet access, and rural connectivity.
IRJET - Third Eye for Blind People using Ultrasonic Vibrating Gloves with Ima...IRJET Journal
This document describes a proposed system called a "Third Eye for Blind People Using Ultrasonic Vibrating Gloves with Image Processing" that aims to help blind people identify objects and navigate safely. The system uses ultrasonic sensors on gloves to detect obstacles within 3 meters and vibrates motors or provides audio alerts. It also includes a camera on a hat that captures images for object recognition processing on a Raspberry Pi module. The proposed system is presented as a low-cost, portable solution to help blind people with navigation and object identification challenges in daily life.
Simulation and analysis of cognitive radioijngnjournal
The increasing demand of wireless applications has put a lot of limitations on the use of available
radio spectrum is limited and precious resource. Many survey of spectrum utilization shows that entire
spectrum is not used at all the times, so many of the radio spectrum is underutilized. Some of the frequency
bands in the spectrum are unoccupied, some of the frequency bands less occupied and few bands are over
utilized. Cognitive radio system is a technique which overcomes that spectrum underutilization. Cognitive
radio is a technique where secondary user looks for a free band to use when primary user is not in use of
its licensed band. A function of cognitive radio is called Spectrum sensing which enables to search for the
free bands and it helps to detect the spectrum hole (frequency band which is free enough to be used) which
can be utilized by secondary user with high spectral resolution capability. The idea of simulation and
analysis of Cognitive Radio System to reuse unused spectrum to increase the total system capacity was
brought in this paper and this work digs into the practical implementation of a Cognitive radio system.
MATLAB R2007b (version7.5) has been used to test the performance of Cognitive radio dynamically.
METHODS FOR DETECTING ENERGY AND SIGNALS IN COGNITIVE RADIOIRJET Journal
This document discusses various methods for detecting energy and signals in cognitive radio systems. It begins with an overview of cognitive radio and the importance of spectrum sensing. It then describes several signal detection techniques used in cognitive radio, including energy detection, matched filtering, cyclostationary feature detection, and others. It also discusses more advanced techniques for signal detection in noisy environments, such as cooperative spectrum sensing. The main components of cognitive radio systems are outlined. Finally, specific spectrum sensing methods like wavelet packet transform and cyclostationary spectrum sensing are explained in more detail.
This document provides an overview of cognitive radio and dynamic spectrum access. It discusses how cognitive radio can detect unused portions of the radio frequency spectrum and allow secondary users to access those "spectrum holes" without interfering with primary licensed users. The document outlines the key functions of cognitive radio including spectrum sensing, spectrum management, and dynamic spectrum access. It also describes different models for dynamic spectrum access, including dynamic exclusive use, open sharing, and hierarchical access models.
Signal Classification and Identification for Cognitive Radio: A ReviewIRJET Journal
This document provides a literature review of signal classification and identification techniques for cognitive radio. It summarizes 13 research papers on topics related to signal classification, modulation classification, spectrum sensing, and the use of machine learning algorithms for cognitive radio applications. The papers evaluated techniques like energy detection, cyclostationary feature detection, statistical signal processing methods, and supervised/unsupervised machine learning algorithms. They found that machine learning generally provides better performance than traditional signal processing techniques, and that techniques like cooperative spectrum sensing can improve detection accuracy in cognitive radio networks.
Security threats and detection technique in cognitive radio network with sens...eSAT Journals
This document discusses security threats and detection techniques in cognitive radio networks. It begins with an introduction to cognitive radio networks and how secondary users can utilize unused spectrum bands of primary users. The main security threats discussed are primary user emulation attacks, where malicious secondary users pretend to be primary users in order to disrupt communications. Energy spectrum sensing techniques are described as a way for secondary users to detect unused spectrum bands without interfering with primary users. The document concludes that primary user emulation attacks and jamming attacks are major security threats in cognitive radio networks, and improving detection of these threats is important for securing cognitive radio communications.
Project:- Spectral occupancy measurement and analysis for Cognitive Radio app...Aastha Bhardwaj
This document provides a summary of a report on spectral occupancy measurement and analysis for cognitive radio applications. It discusses using a discone antenna and RF Explorer spectrum analyzer to collect wireless spectrum usage data sets over time. MATLAB is then used to analyze the data sets, including plotting power spectral density vs. frequency graphs and waterfall charts of power spectral density over frequency and time. Time series analysis techniques are applied to model the radio spectrum occupancy for purposes like predicting spectrum availability to enable opportunistic spectrum access in cognitive radio systems. The goal is to study 24-hour spectrum usage patterns and identify underutilized bands that could be accessed without interfering with primary users.
This document summarizes and compares different spectrum sensing methods for cognitive radio networks. It discusses periodogram and multitaper methods (MTM) for power spectrum estimation. MTM addresses problems with periodogram like bias and variance. Receiver operating characteristic (ROC) curves are used to compare detection performance of different methods. MTM performance depends on number of tapers and time-bandwidth product. The paper evaluates MTM in terms of these and other parameters. It also provides background on cognitive radio, IEEE 802.22 networks, and the cognitive cycle of spectrum sensing, analysis and decision making. Experimental results comparing periodogram and MTM methods are presented.
Similar to Cognitive Radio Networks: a comprehensive study on scope and applications (20)
DEVELOPMENT OF TODDLER FAMILY CADRE TRAINING BASED ON ANDROID APPLICATIONS IN...AM Publications
Toddler family cadre is a community members work voluntarily in fostering and providing information to parents of toddlers about how to properly care for children. Toddler Family cadre desperately need training to increase their skills. There are still a few Toddler family cadres who get training so that the knowledge and skills of parents and other family members in developing toddlers' growth through physical stimulation, motoric intelligence, emotional and social economy as well as possible are still lacking. The purpose of this study is to develop an Android- assisted Toddler family cadre training model in Demak. This research is research in tian research and development. The research location was in Demak Regency. Toddler family cadres became the object of this research. Development of Toddler family cadre training models assisted by Android in Demak is feasible to be used as an effort to improve Toddler Family cadres' capabilities.
TESTING OF COMPOSITE ON DROP-WEIGHT IMPACT TESTING AND DAMAGE IDENTIFICATION ...AM Publications
In recent years the use of composite materials in structural components has become increasingly common in a wide range of engineering applications. Composite materials offer numerous advantages over more conventional materials because of their superior specific properties, but a serious obstacle to a more widespread use of these materials is their high sensitivity to localized impact loading. This paper presents an experimental study to assess the impact response of drop weight impact tests on fiber reinforced polymer composites with deferent load and damage identification of composite using Non-destructive testing techniques ultrasonic testing (UT) C scan. In the study includes checking the strength of the specimen, plotting of graphs between the height and the impact energy obtained and tabulating the results after conducting the various functional tests.
THE USE OF FRACTAL GEOMETRY IN TILING MOTIF DESIGNAM Publications
In this paper I will present the use of fractal geometry to design tile motifs. A fractal is a geometric figure that combines the several characteristics among others: its parts have the same form as the whole, fragmented, and formation by iteration. The concept of fractals has been spread over all fields of sciences, technology, and art. This paper aims to provide an algorithm to creating motifs of tile algorithm for create the tile motif consists of base, iteration, coloration and duplication. In order to help the reader better understand the algorithm, I will present some script using Matlab. We describe a mathematically based algorithm that can fill a spatial region with sequence of randomly placed which may be transformed copies of one motif or several motifs. By using this algorithm, I can produce thousand variety of aesthetically pleasing tile motifs, of which we show a number of examples.
TWO-DIMENSIONAL INVERSION FINITE ELEMENT MODELING OF MAGNETOTELLURIC DATA: CA...AM Publications
Two-dimensional resistivity analysis of magnetotelluric data has been done at “Z” geothermal area which is located in southern part of Indonesia. The objective is to understand subsurface structure beneath reasearch area based on 2-D modeling of magnetotelluric data. The inversion finite element method were used for numerical simulations which requires discretization on the boundary of the modeling domain. The modeling results of magnetotelluric data shows relativity structure dissemination: 0-10 ohm.m in a thickness of 1 km (Clay Cap), 10-100 ohm.m with 1-2 km depth respectively (reservoir zone), and on a scale of 100-1000 ohm.m in a depth of 2-3 km (heat source zone). The result of relativity structure can be used to delineate an area with geothermal prospect around 12 km2.
USING THE GENETIC ALGORITHM TO OPTIMIZE LASER WELDING PARAMETERS FOR MARTENSI...AM Publications
This document presents an optimization of laser welding parameters for martensitic stainless steel using a genetic algorithm. The algorithm aims to minimize the difference between the actual and desired weld size (width and depth) by optimizing laser power, welding speed, and fiber diameter. The genetic algorithm was run 10 times with a population of 30 over 200 iterations each time. The results showed errors between optimized and experimental values of less than 5% for the parameters. The study demonstrates that genetic algorithms can effectively optimize laser welding parameters to achieve a preset weld size.
ANALYSIS AND DESIGN E-MARKETPLACE FOR MICRO, SMALL AND MEDIUM ENTERPRISESAM Publications
The Ministry of Cooperatives and Small and Medium Enterprises launched in 2018 the number of Micro, Small and Medium Enterprises (MSMEs) in Indonesia as many as 58.97 million people. It is predicted that the number of MSMEs players in 2019 will amount to 59.2 million. This shows that the Indonesian people have made changes in the field of family economics which initially as consumptive are now productive. The community prefers to carry out activities that can increase family income. Future MSMEs remain the mainstay of the national economy. In accordance with the government roadmap, in 2020 e-commerce transactions are predicted to reach Rp1,300 trillion or equivalent to USD130 billion. According to data from the Central Statistics Agency (BPS), the contribution of MSMEs to Indonesia's Gross Domestic Product (GDP) reached 61.41%, with the number of MSMEs reaching almost 60 million units. However, only around 8% or 3.79 million of the 59.2 million MSMEs players have used online platforms to market their products. Based on the above problems, researchers conducted research on the analysis and display of E-Marketplace for MSMEs in Indonesia. The type of research used is action research. The object of research is MSMEs which are under the Office of Industry and Trade of Sragen Regency. The method of data collection is by techniques: (1) interview, (2) documentation (3) observation, (4) literature study. The researcher uses the waterfall method in developing the system. The research team has successfully analyzed the E-Market place according to the results of data collection. The research team has succeeded in designing the E-Marketplace for MSMEs. E-Marketplace designed can be used by admin, MSME and user. Admin is in charge of managing E-Marketplace and has full access rights. MSMEs can register online and manage their products in E-Marketplace. Users or buyers can search data in E-Marketplace as desired. To make transactions, users can interact directly with MSMEs according to the data provided in E-Marketplace. E-Marketplace can be used for marketing together MSMEs products. This e-marketplace can be accessed at www.umkmonline.com
REMOTE SENSING AND GEOGRAPHIC INFORMATION SYSTEMS AM Publications
Remote sensing technology's increasing accessibility helps us observe research and learn about our globe in ways we could only imagine a generation ago. Guides to profound knowledge of historical, conceptual and practical uses of remote sensing which is increasing GIS technology. This paper will go briefly through remote sensing benefits, history, technology and the GIS and remote sensing integration and their applications. Remote sensing (RS) is used in mapping the predicted and actual species and dominates the ecosystem canopy.
EVALUATE THE STRAIN ENERGY ERROR FOR THE LASER WELD BY THE H-REFINEMENT OF TH...AM Publications
Currently, the finite element method (FEM) is still one of the useful tools in numerical simulation for technical problems. With this method, a continuum model presented by a certain number of elements with a simple approximation field causes the presence of discretization error in solutions. This paper considers the butt weld by laser which subjected the tension for AISI 1018 steel highness 8 mm. The aim of the study is to use the h-refinement of the FEM in estimation the strain energy error for the laser weld mentioned. The results show that the stability of the h-refinement shown by the value of the relative error of the strain energy is quite small, specifically; FEM is less than 5.7% and extra is no more than 3.7%.
HMM APPLICATION IN ISOLATED WORD SPEECH RECOGNITIONAM Publications
Speech recognition is always being an all-time trendy topic for discussion and also for researches and we see a major application in our life. This paper provides the work done on the application of Hidden Markov model to implement isolated word speech recognition on MATLAB and to develop and train the system for set of self-selective words for specific user (user dependent) to get maximum efficiency in word recognition system. Which uses the forward and Baum-welch algorithm and fitting Gaussian of the Baum-welch algorithm for all the iteration perform. We use a sample of 7 alphabets which are recorded in 15 different ways giving total of 105 word to use for training with each word with 15 variations. This system can be used in real world in system security using voice security system and mainly for children and impaired people.
PEDESTRIAN DETECTION IN LOW RESOLUTION VIDEOS USING A MULTI-FRAME HOG-BASED D...AM Publications
Detecting pedestrians in low resolution videos is a challenging task, due to the small size of pedestrians in the images and the limited information. In practical outdoor surveillance scenarios the pedestrian size is usually small. Existing state-of-the-art pedestrian detection methods that use histogram of oriented gradient (HOG) features have poor performance in this problem domain. To compensate for the lack of information in a single frame, we propose a novel detection method that recognizes pedestrians in a short sequence of frames. Namely, we take the single-frame HOG-based detector and extend it to multiple frames. Our detector is applied to regions containing potential moving objects. In the case of video taken from a moving camera on an aerial platform, video stabilization is first performed to register the frames. A classifier is then applied to features extracted from spatio-temporal volumes surrounding the potential moving objects. On challenging stationary and aerial video datasets, our detection accuracy outperforms several state-of-the-art algorithms.
The aim of this paper is to help the blind people to identify and catch the public transport vehicles with the help of Light Fidelity technology. It is a Navigation aid. When the bus arrives at the bus stand, transmitter in the bus transmits the light signals and receiver in the stick, receives the light signals and a sound signal is generated through the speaker present in the stick. The sound message contains the bus number and the destination of the bus. In addition to this, if the person is absconded or lost, details of the location will be sent to his/her family members by pressing a button. This is made possible with the help of Global System for Mobile (GSM). Finally, presence of water can be detected along the blind person’s path, with the help of water sensors.
EFFECT OF SILICON - RUBBER (SR) SHEETS AS AN ALTERNATIVE FILTER ON HIGH AND L...AM Publications
A digital radiography delivers a radiation dose to patients; therefore it poses potential risk to the patients. One effort to reduce dose is carried out using a radiation filter, e.g. Silicone Rubber (SR) sheet. The purpose of this research was to determine the impact of the SR sheet on the high contrast objects (HCO) and the low contrast objects (LCO). The dose reduction was determined from attenuation x-rays before and after using the SR sheet. Assessment of HCO and LCO was observed from CDR TOR phantom at tube voltage of 48 kVp and tube current of 8 mAs. The physical parameter to assess image quality was the Signal to Noise Ratio (SNR) value in LCO. The maximum x-ray attenuation using the SR sheet is 48.82%. The visibility of the HCO remains the same, namely 16 objects; however the LCO slighly decreases from 14 objects to 13 objects after using the SR sheet. The SNR value decreases with an average value of 15.17%.Therefore, the SR sheet as a alternative filter has no effect on the HCO and has realtively little effect on the LCO. Thus, the SR sheet potentially is used for radiation protection in patients, especially on examinations that do not require low contrast resolution.
UTILIZATION OF IMMUNIZATION SERVICES AMONG CHILDREN UNDER FIVE YEARS OF AGE I...AM Publications
Immunization is the key strategy to curb communicable diseases which are the number one killer of children under five. Immunization prevents mortalities of approximating three million children under five annually. This study aimed to assess utilization of immunization services among children under five of age in Kirinyaga County, Kenya.
REPRESENTATION OF THE BLOCK DATA ENCRYPTION ALGORITHM IN AN ANALYTICAL FORM F...AM Publications
The article presents the study of cryptographic transformations of the Kuznyechik algorithm in relation to differential analysis and the translation of their representations into a more convenient form for cryptanalysis. A simplification of the type of transformations of the algorithm to algebraic the form, in which cryptanalysis software will be more effective. Since the description of the algorithm in the analytical form allows for 16 cycles of execution of the shift register with linear feedback, each of which will be carried out 16 operations of multiplication and 15 operations of addition, reduced to 16 multiplying and 15 the operations of addition. The result is an algebraic form of a linear transformation (from a shift register with linear feedback to the multiplication of the matrix in a finite field). In the future, the algebraic type of transformation can be used to effectively carry out differential cryptanalysis.
Optical character recognition (OCR) is process of classification of optical patterns contained in a digital image. The process of OCR Recognition involves several steps including pre-processing, segmentation, feature extraction, classification. Pre-processing is for done the basic operation on input image like noise reduction which remove the noisy signal from image. Segmentation stage for segment the given image into line by line and segment each character from segmented line. Future extraction calculates the characteristics of character. A Radial Basis Function Neural Network (RBFNN) is used to classification contains the database and does the comparison.
Surveillance refers to the task of observing a scene, often for lengthy periods in search of particular objects or particular behaviour. This task has many applications, foremost among them is security (monitoring for undesirable behaviour such as theft or vandalism), but increasing numbers of others in areas such as agriculture also exist. Historically, closed circuit TV (CCTV) surveillance has been mundane and labour Intensive, involving personnel scanning multiple screens, but the advent of reasonably priced fast hardware means that automatic surveillance is becoming a realistic task to attempt in real time. Several attempts at this are underway.
SIMULATION OF ATMOSPHERIC POLLUTANTS DISPERSION IN AN URBAN ENVIRONMENTAM Publications
Interest in air pollution investigation of urban environment due to existence of industrial and commercial activities along with vehicular emission and existence of buildings and streets which setup natural barrier for pollutant dispersion in the urban environment has increased. The air pollution modelling is a multidisciplinary subject when the entire cities are taken under consideration where urban planning and geometries are complex which needs a large software packages to be developed like Operational Street Pollution Model (OSPM), California Line Source model (CALINE series) etc. On overviewing various works it can be summarized that the air pollutant dispersion in urban street canyons and all linked phenomenon such as wind flow, pollutant concentrations, temperature distribution etc. generally depend on wind speed and direction, building heights and density, road width, source and intensity of air pollution, meteorological variables like temperature, humidity etc. A unique and surprising case is observed every time on numerous combinations of these factors. The main aim of this study is to simulate the atmospheric pollutant dispersion for given pollutant like carbon monoxide, sulphur dioxide and nitrogen dioxide and given atmospheric conditions like wind speed and direction. Computational Fluid Dynamics (CFD) simulation for analysing the atmospheric pollutant dispersion is done after natural airflow analysis. Volume rendering is done for variables such as phase 2 volume fraction and velocity with resolution as 250 pixels per inch and transparency as 20%. It can be observed that all the three pollutant namely nitrogen dioxide, sulphur dioxide and carbon monoxide the phase 2 volume fraction changes from 0 to 1. The wind velocity changes from 3.395×10-13 m/s to 1.692×102 m/s. The dispersion of pollutants follow the sequence Sulphur dioxide>Carbon monoxide>Nitrogen dioxide.
PREPARATION AND EVALUATION OF WOOL KERATIN BASED CHITOSAN NANOFIBERS FOR AIR ...AM Publications
In this article, we have extracted keratin from deccani wool waste and prepared the wool keratin based Chitosan nanofibers by electrospinning technique. The prepared nanofibers mat were prepared with different weight percent ratio like 1wt.%, 3wt.% and 5wt.% with respect to polymer i.e Chitosan. The physicochemical and filtration properties of wool keratin based Chitosan nanofibers were studied. Wool keratin based Chitosan nanofibers were characterized by Fourier transform infrared spectroscopy (FTIR), X-ray diffraction (XRD), differential scanning calorimetry (DSC) and scanning electron microscopy (FESEM). The filtration efficiency of keratin Chitosan nanofibers were investigated through DOP test and heavy metal removal capacity of evaluated through Atomic absorption spectroscopy. FTIR results were showed that Keratin gets compatible with Chitosan. XRD patterns revealed keratin was in crystalline nature and increase the crystalline nature of Chitosan nanofibers. FESEM images showed that uniform nanofibers generation with average fiber diameter 80nm. Nanofibers filtration efficiency against a particulate matter in air was obtained more than 99.53% and excellent property of removal of heavy metal.
ANALYSIS ON LOAD BALANCING ALGORITHMS IMPLEMENTATION ON CLOUD COMPUTING ENVIR...AM Publications
Cloud computing means storing and accessing data and programs over the Internet instead of your computer's hard drive. The cloud is just a metaphor for the Internet. The elements involved in cloud computing are clients, data center and distributed server. One of the main problems in cloud computing is load balancing. Balancing the load means to distribute the workload among several nodes evenly so that no single node will be overloaded. Load can be of any type that is it can be CPU load, memory capacity or network load. In this paper we presented an architecture of load balancing and algorithm which will further improve the load balancing problem by minimizing the response time. In this paper, we have proposed the enhanced version of existing regulated load balancing approach for cloud computing by comping the Randomization and greedy load balancing algorithm. To check the performance of proposed approach, we have used the cloud analyst simulator (Cloud Analyst). Through simulation analysis, it has been found that proposed improved version of regulated load balancing approach has shown better performance in terms of cost, response time and data processing time.
A MODEL BASED APPROACH FOR IMPLEMENTING WLAN SECURITY AM Publications
This paper presents various security features and configurations commonly implemented in WLANs and their aggregated security levels and then proposes a model that enables implementation and evaluation of WLAN security
Harnessing WebAssembly for Real-time Stateless Streaming PipelinesChristina Lin
Traditionally, dealing with real-time data pipelines has involved significant overhead, even for straightforward tasks like data transformation or masking. However, in this talk, we’ll venture into the dynamic realm of WebAssembly (WASM) and discover how it can revolutionize the creation of stateless streaming pipelines within a Kafka (Redpanda) broker. These pipelines are adept at managing low-latency, high-data-volume scenarios.
International Conference on NLP, Artificial Intelligence, Machine Learning an...gerogepatton
International Conference on NLP, Artificial Intelligence, Machine Learning and Applications (NLAIM 2024) offers a premier global platform for exchanging insights and findings in the theory, methodology, and applications of NLP, Artificial Intelligence, Machine Learning, and their applications. The conference seeks substantial contributions across all key domains of NLP, Artificial Intelligence, Machine Learning, and their practical applications, aiming to foster both theoretical advancements and real-world implementations. With a focus on facilitating collaboration between researchers and practitioners from academia and industry, the conference serves as a nexus for sharing the latest developments in the field.
A review on techniques and modelling methodologies used for checking electrom...nooriasukmaningtyas
The proper function of the integrated circuit (IC) in an inhibiting electromagnetic environment has always been a serious concern throughout the decades of revolution in the world of electronics, from disjunct devices to today’s integrated circuit technology, where billions of transistors are combined on a single chip. The automotive industry and smart vehicles in particular, are confronting design issues such as being prone to electromagnetic interference (EMI). Electronic control devices calculate incorrect outputs because of EMI and sensors give misleading values which can prove fatal in case of automotives. In this paper, the authors have non exhaustively tried to review research work concerned with the investigation of EMI in ICs and prediction of this EMI using various modelling methodologies and measurement setups.
Batteries -Introduction – Types of Batteries – discharging and charging of battery - characteristics of battery –battery rating- various tests on battery- – Primary battery: silver button cell- Secondary battery :Ni-Cd battery-modern battery: lithium ion battery-maintenance of batteries-choices of batteries for electric vehicle applications.
Fuel Cells: Introduction- importance and classification of fuel cells - description, principle, components, applications of fuel cells: H2-O2 fuel cell, alkaline fuel cell, molten carbonate fuel cell and direct methanol fuel cells.
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...IJECEIAES
Medical image analysis has witnessed significant advancements with deep learning techniques. In the domain of brain tumor segmentation, the ability to
precisely delineate tumor boundaries from magnetic resonance imaging (MRI)
scans holds profound implications for diagnosis. This study presents an ensemble convolutional neural network (CNN) with transfer learning, integrating
the state-of-the-art Deeplabv3+ architecture with the ResNet18 backbone. The
model is rigorously trained and evaluated, exhibiting remarkable performance
metrics, including an impressive global accuracy of 99.286%, a high-class accuracy of 82.191%, a mean intersection over union (IoU) of 79.900%, a weighted
IoU of 98.620%, and a Boundary F1 (BF) score of 83.303%. Notably, a detailed comparative analysis with existing methods showcases the superiority of
our proposed model. These findings underscore the model’s competence in precise brain tumor localization, underscoring its potential to revolutionize medical
image analysis and enhance healthcare outcomes. This research paves the way
for future exploration and optimization of advanced CNN models in medical
imaging, emphasizing addressing false positives and resource efficiency.
Advanced control scheme of doubly fed induction generator for wind turbine us...IJECEIAES
This paper describes a speed control device for generating electrical energy on an electricity network based on the doubly fed induction generator (DFIG) used for wind power conversion systems. At first, a double-fed induction generator model was constructed. A control law is formulated to govern the flow of energy between the stator of a DFIG and the energy network using three types of controllers: proportional integral (PI), sliding mode controller (SMC) and second order sliding mode controller (SOSMC). Their different results in terms of power reference tracking, reaction to unexpected speed fluctuations, sensitivity to perturbations, and resilience against machine parameter alterations are compared. MATLAB/Simulink was used to conduct the simulations for the preceding study. Multiple simulations have shown very satisfying results, and the investigations demonstrate the efficacy and power-enhancing capabilities of the suggested control system.