You are on page 1of 8

International Journal of Electronics and Computer Science Engineering (IJECSE)

ISSN:2277-1956 Volume 1,Number 1 ,January 2012 Abstract E-Book Email: ijecse@gmail.com ,ijecse.chair@gmail.com www.ijecse.org

The International Journal of Electronics and Computer Science Engineering (IJECSE) is an on line open access journal, to promote the integration of Electronics and Computer Science Engineering and in related disciplines for example Electronics & Telecommunication Engineering, Electronics & Instrumentation Engineering, Electrical & Electronics Engineering, Analog and digital electronics, Image processing, automation, control and instrumentation, computer and information technology aspects of building services.

Paper-1
Title Author Keyword Issue Date Abstract : DWT Based Watermarking Algorithm using Haar Wavelet : Anuradha : Watermarking, Haar Wavelet, DWT, PSNR : January 2012 : The Development of computer networks enhance the development of the information technology in different areas. Sometimes the digital data can be easily used to copied, modified and distributed in an illegal way. The copy right protection, intellectual protection and material right protection for authors, owners, buyers and distributors is necessary and the authenticity of content or matter are crucial factors to solving problem. In such case the digital watermarking techniques play an important role as a valid solution. In this paper, we introduce a suitable method of watermarking because the watermark protects the copyright of digital products and the integrity of certification. The main focused of Watermarking is developing and introducing new techniques for watermark embedding and detection. : 1-6, : 2277-1956 : Vol. 1, No. 1

Page ISSN Source

Paper-2
Title Author Keyword Issue Date Abstract : Mobile WiMAX Security, Architecture and Assessment : Ashish Kaushik : WiMAX; IEEE802.16; Security. : January 2012 : WiMAX (Worldwide Interoperability for Microwave Access) is an emerging wireless communication system that can provide broadband access with large-scale coverage. Since 2001, WiMAX has evolved from 802.16 to 802.16d standard for fixed wireless access and to the new IEEE 802.16e (Mobile WiMAX) standard with mobility support. The importance of IEEEStandard 802.16 WiMAX is growing and will compete with technologies such as UMTS. In this paper, we focus on how WiMAX can be used in an enterprise environment under the assumption that a WiMAX network can be hosted by enterprise. Three research questions naturally arise when

we consider an enterprise wireless infrastructure built with WiMAX - what integrated wireless network architecture would look like, if it is possible to derive a unified security model for such an integrated network. Page ISSN Source : 7-14, : 2277-1956 : Vol. 1, No. 1

Paper-3
Title Author Keyword Issue Date Abstract : A Neural Network Algorithm based Blind source Separation using Fast Fixed point Independent Component Analysis. : Anuradha, Nishant Tripathi : Fixed point ICA algorithm, Mixer signal, Blind source separation, (PSNR). : January 2012 : Image separation is defined as decomposing a real world image mixture into individual images objects. Independent component analysis is an active area of research and is being utilized for its capability in statistically independent separation images. Neural network algorithm ICA has been used to extract interference and mixed images and a very rapid developed statistical method during last few years, but because of very less literature (content) is available on the performance and analysis, i.e., how does it behave in communication science and environment? So, in this paper fast fixed point algorithms for ICA-based blind source separation has been presented. In blind source separation primary goal is to recover all original images using the observed mixtures only. Independent Component Analysis (ICA) is based on higher order statistics aiming at searching for the components in the mixed signals that are statistically as independent from each other as possible. : 15-21, : 2277-1956 : Vol. 1, No. 1

Page ISSN Source

Paper-4
Title Author Keyword Issue Date Abstract : Digital Watermarking Algorithm based on Singular Value Decomposition and Arnold Transform : Divya Saxena : Watermarking, Singular Value Decomposition, Arnold Transform, PSNR, NC. : January 2012 : Basically the Watermarking process is use for hiding secret information for labeling digital picture. This paper presents a method of watermark embedding and extracting which is based on SVD (singular value decomposition) and Arnold Transform. The SVD is a linear algebra

technique used for diagonalizable matrices and it transfer of convert most of the signal energy into very few singular values. The embedded position is selected according to the secret key which is obtained during the course of the scrambling degree calculation in Arnold transform. The experimental results showed that the Arnold transformation helpful in digital watermarking process. A group of experiments are used for test the effectiveness of the proposed algorithm, and experimental results show that the scheme is effectiveness and robust against different image processing operation. Page ISSN Source : 22-27, : 2277-1956 : Vol. 1, No. 1

Paper-5
Title Author Keyword Issue Date Abstract : An overview of Technical aspect for WiFi Networks Technology : Shailandra Kaushik : WiFi integrated network, IEEE802.11, Advantage and Application of WiFi. : January 2012 : generally the wireless networks have been widely developed Compared with wired network and the wireless communication removes the restriction of wired connections, as well as support to ubiquitous access to the Internet. One of successful wireless networks architecture is WiFi (wireless fidelity) which is based on a serial standard of IEEE 802.11 and it is very popular in providing different data services. Integrated WiFi network is a great potential for the future due to the high data transport capacity of WiFi. In a university campus environment, e.g. WiFi can be used for supporting indoor high speed data applications and WiFi can be used inside a train for passengers to access various services. Recently, WiFi have been proposed as attractive wireless communication technologies for providing broadband access for metropolitan areas. : 28-34, : 2277-1956 : Vol. 1, No. 1

Page ISSN Source

Paper-6
Title Author Keyword Issue Date Abstract : A Novel Approach for Digital Watermarking of an Image Using DFT : Awanish Kumar Kaushik : Digital Watermarking, Discrete Fourier Transform. : January 2012 : Watermarking techniques are always used for copyright and ownership assertion purposes to protect the important documents. There are various type of watermark embedding techniques in transform domain are presented, for example 2-D DFT, 2-D DCT, 2-D DWT, 3-D DCT and 3-D DWT. Some time in case of an image authentication research, an original image is divided into smaller blocks, and inserts a watermark into each and every block after that modification concept is used to detect the watermark in the blocks. A novel design of a DFT-based digital watermarking system for images is proposed in this paper. By using adding invisible watermark into the digital image, the system provides copyright protection. First of all, the original images is split into the blocks and proceed DFT transform after that by using Arnold scrambling change water mark and produce pseudo-random sequence, result a image with watermark is produce.

Page ISSN Source

: 35-41, : 2277-1956 : Vol. 1, No. 1

Paper-7
Title Author Keyword Issue Date Abstract : Applying Channel Estimation in MIMO Network Coding protocol : Aanchal Gupta, Tripti Choudhary : Alamouti Code, MIMO, Network Coding, Pilot symbol based Least Square Channel Estimation, : January 2012 : in this paper, a combination of MIMO and network coding, based on MINEC protocol, is used for improving the performance of the relay networks in fading environments. We have introduced the concept of channel estimation into the proposed three-node relay network. When the receiver is having no knowledge of the channel, then the Rayleigh fading channel has to be estimated using some technique, as the channel state information is required at the receiver for the decoding process. In this brief, Least Square Channel Estimation is presented to estimate the channel for Maximum Likelihood Decoding at the detector. Thus, a comparison of the Probability of Error verses SNR characteristic is shown when the channel is assumed to be known at the receiver and when it is estimated. : 42-51, : 2277-1956 : Vol. 1, No. 1

Page ISSN Source

Paper-8
Title Author Keyword Issue Date Abstract : A Survey of Routing Protocols for Ad Hoc Wireless Home Networks : Meenakshi Chaturvedi : Ad hoc Networks, Mobile Host, Routing Protocols : January 2012 : Ad hoc networks are wireless mobile networks that do not rely on preexisting infrastructure and these networks allow a more flexible model of communication than traditional networks since the user is not limited to a fixed physical location. In order to facilitate communication within the network, a routing protocol is used to discover routes between nodes. The primary goal of such an ad hoc network routing protocol is correct and efficient route establishment between a pair of nodes so that messages may be delivered in a timely manner. Route construction should be done with a minimum of overhead and bandwidth consumption. In this paper, we present routing protocols designed for these ad hoc networks by describing the operation of each of the protocols. : 52-63, : 2277-1956 : Vol. 1, No. 1

Page ISSN Source

Paper-9
Title Author Keyword Issue Date Abstract : Cooperative spectrum sensing and Detection efficiency in cognitive radio network : Nishant Dev Khaira, Prateek Bhadauria. : Cognitive Radio, Cooperation, Spectrum Sensing Techniques, Cooperative Spectrum Sensing, : January 2012 : Spectrum sensing is required for better utilization of spectrum and preventing interference with licensed users. However, detection performance in practice is often compromised with multipath fading, shadowing and receiver uncertainty issues. To mitigate the impact of these issues, cooperative spectrum sensing has been shown to be an effective method to improve the detection performance by exploiting spatial diversity. While cooperative gain such as improved detection performance and relaxed sensitivity requirement can be obtained, cooperative sensing can incur cooperation overhead. : 64-73, : 2277-1956 : Vol. 1, No. 1

Page ISSN Source

Paper-10
Title Author Keyword Issue Date Abstract : MATLAB Based Digital IIR Filter Design : Samarjeet Singh, Uma Sharma. : IIR Filter, FDA Tool : January 2012 : a fundamental aspect of signal processing is filtering. Filtering involves the manipulation of the spectrum of a signal by passing or blocking certain portions of the spectrum, depending on the frequency of those portions. In this paper, Digital filters are designed using frequency specifications. Matlab provides different options for digital filter design, which includes function, calls to filter algorithms and a graphical user interface called Sptool. A variety of filter design algorithms are available in Matlab for both IIR and FIR filters. This paper discusses the different options in Matlab to design digital IIR filter. : 74-83, : 2277-1956 : Vol. 1, No. 1

Page ISSN Source

Paper-11
Title Author Keyword Issue Date Abstract : Design Error Performance of Space-Frequency Block Coded OFDM Systems with Different Equalizers and For Different Modulation Schemes : Rijhun Tripathi, Ruchi Giri, Amit Kumar. : MIMO-OFDM, Space-frequency Block coding, ZF Equalizer, Decision Feedback Equalizer, : January 2012 : Multiple transmit and receive antennas can be used to form multiple-input multiple-output (MIMO) channels to increase the capacity (by a factor of the minimum number of transmit and receive antennas) and data rate. In this paper, the combination of MIMO technology and orthogonal frequency division multiplexing (OFDM) systems is considered for wideband transmission to mitigate inter symbol interference and to enhance system capacity. It owns the advantages of both MIMO and OFDM. MIMO-OFDM system exploits the space and frequency diversity simultaneously to improve the performance of system. The coding is done across OFDM subcarriers rather than OFDM symbols. : 84-92, : 2277-1956 : Vol. 1, No. 1

Page ISSN Source

Paper-12
Title : IP Routing Configuration in a Router with Troubleshooting Author : Gyan Prakash Pal, Sadhana Pal, Aradhana Jyotsana, Satya Prakash Keyword : Routers, IP addresses, CLI commands, Issue Date : January 2012 Abstract : Today whole world is connected via internet for worldwide communication. Different Network devices like router, switch, bridge, hub, server, multiplexer/Demultiplexer and Modem is used for communication. To connect different networks only routers are used to Provide routes for packets of data from one network to another. To communicate between Different networks, IP routing is must. This paper helps you to configure IP routing and Bring-up an interface of a router and also troubleshoot the network connectivity between IP Devices. In this paper CLI commands are used for configuration. Page : 93-108, ISSN : 2277-1956 Source : Vol. 1, No. 1

Paper-13
Title Author Keyword Issue Date Abstract : Improving TCP Performance in Multi Hop Mobile Adhoc Network : Raghuraj Singh. : Wireless multihop networks, Mobility Management, Adaptive communication protocols. : January 2012 : TCP is a window-based flow and congestion control protocol that uses a sliding window mechanism to manage its data transmission. The purpose of this scheme is to guarantee that the sender adjusts its transmission rate to meet both sender and receiver needs. Thus, the TCP sender contains a variable denoted window determining the amount of packets it can send into the network before receiving an ACK. This variable changes dynamically over time to properly limit the connections sending rate. Flow control is implemented to avoid that a TCP sender overflows the receivers buffer. Thus, the receiver advertises in every ACK transmitted a window limit to the sender. This window is named receiver advertised window (rwin) and changes over time depending on both the traffic conditions and the application speed in reading the receivers buffer. Therefore, the sender may not increase its window at any time beyond the value specified in rwin. In contrast to flow control, congestion control is concerned with the traffic inside the network. : 109-114, : 2277-1956 : Vol. 1, No. 1

Page ISSN Source

Paper-14
Title Author Keyword Issue Date Abstract : BER Analysis of Wideband Code Division Multiple Access : Veeranna.D, Sanjeev Kumar Sharma, Yashwant Singh. : Bit Error Rate, Code Division Multiple Access, Quadrature phase shift keying, : January 2012 : There has been a dramatic change in the field of field of telecommunication service. M-ary Quadrature Amplitude modulation and Quadrature Phase shift Keying (QPSK) modulation schemes are considered in Wideband code Division Multiple Access (WCDMA) system. Here we are using MATLAB for simulation and evaluation of BER ( Bit Error Rate )and SNR(Signal to Noise Ratio). There is analysis of Quadrature Phase shift Keying and 16 ary Quadrature Amplitude modulation which are being used in WCDMA (wideband code division multiple access) system. This system is more suitable modulation technique to suit the channel quality : 115-120, : 2277-1956 : Vol. 1, No. 1.

Page ISSN Source

Paper-15
Title Author Keyword Issue Date Abstract : COMPARATIVE STUDY OF IMAGE COMPRESSION ALGORITHMS FOR TRANSMISSION OVER WIRELESS NETWORKS : Rakesh Kumar, Gopal Verma, Tapesh Parashar. : JPEG, JPEG 2000, AVC/H.264, AIC, HD photo/JPEG XR and JPWL : January 2012 : In this paper, image compression algorithms have reviewed for transmission over wireless networks. The performance evaluation is based on PNSR, bit-rate, computational complexity etc. and is evaluated using Advanced Image Coding software. It has observed that compression efficiences are reasonably comparable for the JPEG 2000 and AIC, which outperforms the conventional JPEG. Baseline JPEG 2000 is more error resilient to AWGN but its extension JPWL provides additional mechanism for error protection and correction. : 121-129, : 2277-1956 : Vol. 1, No. 1.

Page ISSN Source

Paper-16
Title Author Keyword Issue Date Abstract : PERFORMANCE ANALYSIS OF DIFFERENT CHANNELS OF W-CDMA USING DIFFERENT MODULATION TECHNIQUES : Ruchi Giri, Prof.Arun K Arora, Rijhun Tripathi. : AWGN, DSSS, Multipath Rayleigh fading, CDMA, BER, SNR, QPSK, 16-QAM. : January 2012 : The transmission from base station to mobile or downlink transmission using M-array Quadrature Amplitude modulation (QAM) and Quadrature phase shift keying (QPSK) modulation scheme are consider in W-CDMA system. We can analysis the performance of these modulation techniques when the system is subjected to AWGN and multipath Rayleigh fading are consider in the channel. We will use Matlab for simulation and evaluation of BER and SNR for W-CDMA system models. : 130-140, : 2277-1956 : Vol. 1, No. 1.

Page ISSN Source

Paper-17
Title Author Keyword Issue Date Abstract : Effect on WDM due to Cross Phase Modulation. : Geeta Saini, Darpan Gupta, Neeraj Maurya. : cross-phase modulation (XPM), BER, Continuous Wave. : January 2012 : Cross phase modulation (XPM) is known as the phenomenon that the variations of intensity of one optical signal can change the refractive index of the fiber (Kerr effects), and modulate the phase of other optical signals co-propagating in the same fiber .We compare the impact of Qfactor, BER and timing jitter due to cross-phase modulation (XPM) in a wavelength-divisionmultiplexed system for different length of fiber. : 141-146, : 2277-1956 : Vol. 1, No. 1.

Page ISSN Source

Paper-18
Title Author : A Doherty Amplifier with Envelope Tracking Technique and DSP for High Efficiency : Ambar Saxena, Rakesh Kumar, Sahab Ram.

Keyword Issue Date Abstract

Page ISSN Source

: ACLR, ACPR, PAE, WCDMA. : January 2012 : A Doherty amplifier employing input signal envelope tracking technique. In the amplifier, gate bias of peaking amplifier is controlled according to the magnitude of the envelope. The performance of the microwave Doherty amplifier has been compared with class AB amplifier. DSP is used to dynamically adjust the gate bias of the auxiliary (peaking) amplifier at the rate of the signal envelope to obtain gain flatness. : 147-152, : 2277-1956 : Vol. 1, No. 1.

Paper-19
Title Author Keyword Issue Date Abstract : A MULTILEVEL AUTOMATIC THRESHOLDING FOR IMAGE SEGMENTATION USING GENETIC ALGORITHM AND DWT. : Rakesh Kumar, Tapesh Parashar, Gopal Verma : Histogram, Thresholding, Genetic Algorithm, Discrete Wavelet Transform : January 2012 : In this paper, An Automatic Multilevel Thresholding Method for Image segmentation is proposed based on Discrete Wavelet Transforms and Genetic Algorithm. We have combined Genetic Algorithm with DWT to make Segmentation faster and adequate results. First the length of the histogram is reduced by using DWT. Using this Reduced Histogram, the number of Thresholds and Threshold Value are determined by Genetic Algorithm. : 153-160, : 2277-1956 : Vol. 1, No. 1.

Page ISSN Source

You might also like