Loading...

Proceedings of

International Conference on Pervasive Computing and Communication PCC 2012

Date
17-Jun-2012
Location
new delhi - NCR , India
Authors
52
ISBN
978-981-07-2579-2

16 Articles Published

1. DETERMINATION OF PHASE MATCHING ANGLE FOR NON- RESONANT TOTAL INTERNAL REFLECTION QUASI-PHASE MATCHING IN A PARALLEL SLAB USING MATLAB/SIMULINK SOFTWARE

Authors: ARDHENDU SAHA , SMITA BANIK , SUMITA DEB , UPAMA DAS

Abstract: The simulated model calculates the phase matching angle for a parallel isotropic slab made of Zinc Telluride (ZnTe), Cadmium Telluride (CdTe), Gallium Arsenide (GaAs) and Zinc Selenide (ZnSe) having thickness 't' at a given wavelength of 10.6 μm by determining the wave-vector mismatch. The model also generates the status of fulfillment of Total Internal Reflection (TIR) inside the semiconductor slab. The simulated results indicate phase matching angle of 0.9034 rad for a slab thickness of 800 μm in case of ZnTe and 0.5457 rad for CdTe taking the slab thickness as 500 μm. The phase matching angle for ZnSe is 1.481 rad and that of GaAs is 0.6984 rad for a slab of thickness 800 μm for both the materials. For all the cases, the TIR condition is found satisfying

Keywords: Wave-vector mismatch, Phase matching, Quasi phase matching

Pages: 1 - 4 | DOI: 10.15224/978-981-07-2579-2-125

2. QUASI-PHASE MATCHED SECOND-HARMONIC GENERATION IN TELLURIDE COMPOUNDS USING TOTAL INTERNAL REFLECTION

Authors: SMITA BANIK , SUMITA DEB , UPAMA DAS , ARDHENDU SAHA

Abstract: We analytically describe quasi-phase matched second-harmonic generation in the mid-IR region in a parallel isotropic semiconductor slab made of Zinc Telluride (ZnTe) and Cadmium Telluride (CdTe) using total internal reflection quasi phase matching technique. The simulated results indicate conversion efficiencies of 4.08% (centered at 8.495 μm) and 15.83% (centered at 9.341 μm) in a 400 μm thick, 10-mm-long slab of ZnTe and CdTe respectively. The losses due to surface roughness, Goos-Hänchen shift and absorption of the slab have been considered in the analysis. The effect of variation in the angle of incidence has been studied for both the materials.

Keywords: second-harmonic generation, total internal reflection, quasi phase matching, isotropic, zinc telluride, cadmium telluride

Pages: 5 - 8 | DOI: 10.15224/978-981-07-2579-2-129

3. BER PERFORMANCE OF GOLDEN CODED MIMO-OFDM SYSTEM OVER RAYLEIGH AND RICIAN FADING CHANNELS

Authors: A VAMSI KRISHNA , G DHRUVA , V SAI KRISHNA , V SINHA

Abstract: In this paper, we analyze the Bit Error Rate (BER) performance of Golden coded Multiple-Input Multiple-Output Orthogonal Frequency Division Multiplexing (MIMO-OFDM) system over Rician multipath fading channel. We also compare the performance of the MIMO-OFDM system using Golden code in Rayleigh and Rician multipath fading channels. We discuss the effects of the presence of line-of-sight (LoS) component in the multipath fading environment which renders the improvement in the overall performance of the Golden coded MIMO-OFDM. This paper discusses the performance of Golden codes in a frequency selective Rician fading channel. To deal with the frequency selective fading channel, we use the OFDM (Orthogonal Frequency Division Multiplexing) modulation. The BER performance of the Golden coded MIMO-OFDM system under several propagation conditions has been evaluated

Keywords: MIMO, OFDM, Golden STBC, Rayleigh fading, Rician fading

Pages: 9 - 12 | DOI: 10.15224/978-981-07-2579-2-165

4. IMPACT OF WEB QUERY MORPHOLOGY AND AMBIGUITY ON SEARCH ENGINE’S PERFORMANCE

Authors: ANAND P. DWIVEDI , ARTI MISHRA , SANJAY K. DWIVEDI , V.K. PATHAK

Abstract: The effectiveness of Internet search engines are often hampered by the deficiencies in user queries and the reluctance or inability of users to build less ambiguous multiword queries. This is mainly because of the language morphologies and word ambiguities. Neither simple query expansion techniques nor enhanced indexing mechanisms have been satisfactory in addressing these problems, because these methods do not consider the user context or knowledge of the problem domain. This paper covers the comprehensive analysis of web queries in English to know the impact of morphology (especially root word) and ambiguity on the Google search engine. We have used different query sets to test each of these aspects. Our results show that the search engines normally find themselves incompetent to understand and resolve these issues on behalf of user. Therefore, the mean average precision of Google search engine has reduced in case of the query set having any type of ambiguities as compared to the oth

Keywords: query ambiguity, morphology, search engine, precision

Pages: 13 - 18 | DOI: 10.15224/978-981-07-2579-2-169

5. 3D VIRTUAL LAB USING MULTIMEDIA TECHNIQUES FOR ADVANCED LEARNING

Authors: AMIT SHARMA , ANUJ KUMAR , NEERAJGANGWAL , P.K. GARG , R.D. GARG , S.K. GHOSH

Abstract: We can use the multimedia techniques for the advancement of education. As we know that virtual world provides a logical progression in learning tools within a constructivist pedagogical perspective. Gaming industry cannot only be used for entertainment but can also be used for education purposes. So we have developed a 3D virtual lab environment in which a user can simulate the various research experiments and can learn from a distant place.

Keywords: 3D environment simulation, Virtual lab, multimedia techniques in e learning.

Pages: 19 - 22 | DOI: 10.15224/978-981-07-2579-2-174

6. PAGERANKED CONCEPTUAL SEARCH FOR ANDROID DOMAIN

Authors: DEEPIKA BHATIA , PREETI BAJAJ , SMITA NIRKHI

Abstract: As the web is rapidly growing, there is a need to cater the user's interests and needs from their behavior to extract the relevant information from the contents of the web. Web mining is used to categorize users and pages by analyzing the user's behavior, the contents of the pages and order of the URLs accessed. It has become an increasingly important task. There is also a sharp increase in the requirements for location-based services using location information, due to the development of wireless internet and mobile systems. Web structure mining approach has been user in our study. Concept mining and user profile updation approaches have been used. The concept of weighted page ranked algorithm is used to display the final results.

Keywords: Web search, Personalised Search, page ranking, GPS

Pages: 23 - 27 | DOI: 10.15224/978-981-07-2579-2-195

7. DESIGN OF MOBILE GROUP COMMUNICATION SYSTEM IN UBIQUITOUS COMMUNICATION NETWORK

Authors: AKHIL NAIR

Abstract: The advent of ubiquitous IP networks enables users to freely move and continue network services anytime, anywhere by means of mobile handheld devices. This paper exploits network ubiquity and advanced device capability to develop a novel mobile group communication system. Our work presents the design and implementation of a proof-of concept software system. This system architecture consists of four components: central tracking, handheld tracking, handheld messaging and Web-based administration subsystems. Their functional integration thus fulfills both location tracking and mobile messaging services in support of mobile group communication. After prototype and demonstration, the proposed system is able to offer a variety of novel location-aware and text/voice communication scenarios to mobile social communities in ubiquitous IP network environments.

Keywords: mobile group communication, mobile messaging, location tracking, ubiquitous service

Pages: 28 - 35 | DOI: 10.15224/978-981-07-2579-2-202

8. DESIGN OF MOBILE GROUP COMMUNICATION SYSTEM IN UBIQUITOUS COMMUNICATION NETWORK

Authors: AKHIL NAIR

Abstract: The advent of ubiquitous IP networks enables users to freely move and continue network services anytime, anywhere by means of mobile handheld devices. This paper exploits network ubiquity and advanced device capability to develop a novel mobile group communication system. Our work presents the design and implementation of a proof-of concept software system. This system architecture consists of four components: central tracking, handheld tracking, handheld messaging and Web-based administration subsystems. Their functional integration thus fulfills both location tracking and mobile messaging services in support of mobile group communication. After prototype and demonstration, the proposed system is able to offer a variety of novel location-aware and text/voice communication scenarios to mobile social communities in ubiquitous IP network environments.

Keywords: mobile group communication, mobile messaging, location tracking, ubiquitous service

Pages: 28 - 35 | DOI: 10.15224/978-981-07-2579-2-202

9. COMPARATIVE STUDY OF EXISTING ECMS BASED ON USE AND ADVANTAGES

Authors: SONIKA TYAGI

Abstract: ENTERPRISE CONTENT MANAGEMENT SYSTEM” (ECMS) has been derived or we can see it is an extension of the content management system(CMS) by looking at the need of today's enterprises. There is vast increase in the amount of document in the big enterprises because of which it becomes very important to categorize the document and to hide them as per their importance or as per their confidentiality. ECMS is a means of organizing the documents or other data and also store them that relate to the organization's processes. ECMS is a strategy, methods, and tools used throughout the lifecycle of the content. Many enterprises are opting the Enterprise Content Management System as it becomes easier to work with enterprises vast records efficiently and can manage vast data with so much of ease. In this paper we will study the most popularly used existing ECMS, based on the need of the enterprise i.e. what type of data to be stored and by analyzing the actual need of the enterprise we will suggest bes

Keywords: CMS, DMS, ECMS, LMS, WCM, WECMS

Pages: 36 - 40 | DOI: 10.15224/978-981-07-2579-2-212

10. CYBERNETICS PROTECTOR

Authors: ABHIJEET BHOR , ASHUTOSH MISHRA , GANDHALI KULKARNI , MUSTAFA BAKROLWALA , PRATIK CHANDWANI

Abstract: The purpose of this paper is to present a website for Secret Intelligence Agency. The agency has always used undercover agents to solve complex cases and dismantle criminal organizations. The paper presents a solution so that Secret Intelligence Agencies and their agents can communicate and exchangethe evidences in a secured way. The paper presents Cybernetics Protector developed using the J2EE technologies.

Keywords: Secret Intelligence Agency, Security, Face Recognition, Digital Signature

Pages: 41 - 44 | DOI: 10.15224/978-981-07-2579-2-214

11. A VLSI DESIGN APPROACH FOR RISC BASED MIPS ARCHITECTURE

Authors: A. Y. DESHMUKH , MUNMUN GHOSAL

Abstract: This paper describes the design and analysis of the functional units of RISC based MIPS architecture. The functional units includes the Instruction fetch unit, instruction decode unit, execution unit, data memory and control unit. The functions of these modules are implemented by pipeline without any interlocks and are simulated successfully on Modelsim 6.3f and Xilinx 9.2i. It also attempts to achieve high performance with the use of a simplified instruction set.

Keywords: MIPS, RISC, Pipelining, Memory.

Pages: 45 - 49 | DOI: 10.15224/978-981-07-2579-2-243

12. CLOUD BUILDING ON CORE-I3 USING VMWARE WORKSTATION

Authors: AAKANKSHA AGRAWAL , AJIT SINGH , TARUN GOYAL

Abstract: Cloud building means virtualization of whole system (Hardware, Software) and that system to be accessible through network any time anywhere in this world. Vmware workstation provides the facility of virtualization. As we can virtualizes our physical machine using vmware as well made it access able offline over the host based physical machine. In this paper we have shown the development procedure of cloud on Core-i3 using vmware workstation. We have also discussed about the problems with their solutions which we had faced during this development work

Keywords: cloud computing, vmware workstation, virtualization & core-i3

Pages: 50 - 52 | DOI: 10.15224/978-981-07-2579-2-269

13. A COMPLETE TOOL-CHAIN FOR DEVELOPING AND TESTINGWSNAPPLICATIONS WITH FLEXOR

Authors: ANNA FÖRSTER , DANIELE PUCCINELLI , KAMINI GARG , SILVIA GIORDANO , TIZIANO LEIDI

Abstract: In this paper, we present the complete tool-chainfor FLEXOR, a sustainable and platform independent softwarearchitecture that is optimized to support the implementation,rapid prototyping, evaluation, and testing of wireless sensornetwork applications

Keywords: Wireless SensorNetworks, Architecture, Tool

Pages: 53 - 57 | DOI: 10.15224/978-981-07-2579-2-275

14. A COMPLETE TOOL-CHAIN FOR DEVELOPING AND TESTINGWSNAPPLICATIONS WITH FLEXOR

Authors: ANNA FÖRSTER , DANIELE PUCCINELLI , KAMINI GARG , SILVIA GIORDANO , TIZIANO LEIDI

Abstract: In this paper, we present the complete tool-chainfor FLEXOR, a sustainable and platform independent softwarearchitecture that is optimized to support the implementation,rapid prototyping, evaluation, and testing of wireless sensornetwork applications

Keywords: Wireless SensorNetworks, Architecture, Tool

Pages: 53 - 57 | DOI: 10.15224/978-981-07-2579-2-275

15. ROUTING ALGORITHMS FOR CLOS INTERCONNECTION NETWORKS.

Authors: AAKANKSHA AGRAWAL , TARUN GOYAL , SHAILENDRA MISHRA

Abstract: The Clos Interconnection Networks are a class of multistage switching network topologies that provide alternate path between inputs and outputs, making it possible to minimize or eliminate the blocking that can otherwise occur in such networks. In this paper, we study the various routing algorithms which have been proposed each imposing extra cost due to hardware use and re-routing algorithm and we also study a routing algorithm which takes blocking avoidance approach for avoiding related costs. There is no blocking while the primary routing is performed from the input to output. The results show that this algorithm is easy than the algorithms previously proposed.

Keywords: Clos Interconnection Networks, Routing Algorithm

Pages: 58 - 60 | DOI: 10.15224/978-981-07-2579-2-277

16. ANALYSIS OF A LAN UNDER DIFFERENT ETHERNET WIRING STANDARDS WITH VARIATION IN TIME AND COMPONENTS

Authors: R H GOUDAR

Abstract: In this paper we simulate a campus LAN using IT Guru Opnet 9.1 and then we calculate the performance of this network under 10BaseT and 100BaseT Ethernet wiring standards with varying time and components (i.e. no. of hubs) and finally we compare the results i.e. which standard perform better for which time duration and for how many number of components. We find that numbers of collision counts at hubs are always more in 10BaseT, because of the nature of this standard. Hubs are always more utilized in 10BaseT, because of more retransmission attempts due to high number of collisions in 10BaseT. Hubs filter no traffic for 10BaseT but for 100BaseT they filter some traffic and perform well with increasing time. When we increase the time not the components the performance of switch is good under 100BaseT because it filter more traffic with increasing time as compare to 10BaseT. When we increase number of components and time period in 100BaseT, it also performs well. In this case when time is

Keywords: Collision count; Utilization; Traffic Received, Traffic Forwarded, 10BaseT, 100BaseT

Pages: 61 - 68 | DOI: 10.15224/978-981-07-2579-2-279

Popular Proceedings

ESSHBS 2017

7th International Conference On Advances In Economics, Social Science and Human Behaviour Study

ICETM 2023

9th International E-Conference on Engineering, Technology and Management

ASET 2017

7th International Conference on Advances in Applied Science and Environmental Technology

ACSM 2017

7th International Conference on Advances in Civil, Structural and Mechanical Engineering

CSM 2017

5th International Conference on Advances in Civil, Structural and Mechanical Engineering

SEM 2017

5th International Conference on Advances in Social, Economics and Management

ICETM 2022

8th International E- conference on Engineering, Technology and Management

ACSEE 2019

8th International Conference on Advances in Civil, Structural and Environmental Engineering