Refine your search
Collections
Co-Authors
Journals
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z All
Mohan, K. N.
- Design and Implementation of Dolph Chebyshev and Zolotarev Circular Antenna Array
Abstract Views :205 |
PDF Views:0
Authors
Affiliations
1 School of Electronics Engineering, VIT University, Vellore - 632014, Tamil Nadu, IN
2 BITS Pilani, Hyderabad - 500078, Telangana
1 School of Electronics Engineering, VIT University, Vellore - 632014, Tamil Nadu, IN
2 BITS Pilani, Hyderabad - 500078, Telangana
Source
Indian Journal of Science and Technology, Vol 9, No 36 (2016), Pagination:Abstract
Objectives: Uniform Circular Antenna arrays (UCAs) are most common in conformal antenna arrays with uniform excitation of elements. We targeted to design and synthesis UCAs with a high gain of >10 dB and a low sidelobe level of <20 dB. Methods: In this paper, the Uniform Circular Array (UCA) is presented with phase mode theory to extract the mode excitation using newly developed ARRAYTOOL. Along with phase modes, the magnitude distribution of elements is synthesized with Chebyshev and Zolotarev Polynomials whose resulting far-field patterns are desirable. Findings: It is observed that the Chebyshev and Zolotarev far-field pattern results a low sidelobe of 20 to 25 dB with fewer elements. It’s also observed that the elements spacing of more than λ/4 yields grating lobes with the visible region. This is one the design constrains for UCA with non-uniform excitation. Improvements: In comparison with uniformly excited UCAs, the Chebyshev and Zolotarev Polynomials show desirable radiation patterns with fewer elements. With sidelobe of less than 25 dB and minimum null points, the proposed microstrip array shows expected performance for RADAR system with high rotational symmetry.Keywords
Antenna Array Factor, Dolph Chebyshev, HPBW, Uniform Circular Array.- Block chain Technology for IoT Security and Privacy:“The discourse Analysis of a Sensible Home”
Abstract Views :225 |
PDF Views:0
Authors
Affiliations
1 School of CSA, REVA University, Bangalore, IN
2 School of Computer Science & Applications, REVA University, Bangalore, IN
1 School of CSA, REVA University, Bangalore, IN
2 School of Computer Science & Applications, REVA University, Bangalore, IN
Source
International Journal of Advanced Networking and Applications, Vol 10, No SP 5 (2019), Pagination: 13-17Abstract
Internet of Things (IoT) security and protection re-principle a remarkable check, primarily as a result of the big scale and disseminated nature of IoT systems. Blockchain-based methodologies provide decentralised security and protection, nevertheless they embrace crucial vitality, delay, and procedure overhead that won't affordable for many quality duty-bound IoT gadgets. In our past work, we have a tendency to exhibited a light-weight mental representation of a blockchain particularly designed to be used in IoT by confiscating the Proof of labor (POW) and therefore the plan of coins. Our methodology was exemplified in an exceedingly sensible home setting and contains of 3 elementary levels to be specific: distributed storage, overlay, and keen home. during this paper we have a tendency to dig more and layout the various center components and components of the savvy home level. every savvy house is equipped a perpetually on the net, high quality contrivance, called "mineworker" that's answerable of taking care of all correspondence within and out of doors to the house. The excavator to boot protects a non-public and secure blockchain, used for dominant and reviewing correspondences. we have a tendency to exhibit that our planned BC-based splendid home structure is secure by through and thru gazing its security with relation to the basic security goals of mystery, trait, and availableness. Finally, we have a tendency to gift reenactment results to focus on that the overheads (with relation to traffic, handling time and essentiality usage) displayed by our framework square measure moot in relevancy its security and assurance gains.References
- Sicari, A. Rizzardi, L. A. Grieco, and A. Coen-Porisini, “Security, privacy and trust in web of things: The road ahead,” pc Networks, vol. 76, pp. 146–164, 2015.
- Roman, J. Zhou, and J. Lopez, “On the options and challenges of security and privacy in distributed web of things,” pc Networks, vol. 57, no. 10, pp. 2266–2279, 2013.
- Chakravorty, T. Wlodarczyk, and C. Rong, “Privacy conserving information analytics for good homes,” in Security and Privacy Workshops (SPW), 2013 IEEE. IEEE, 2013, pp. 23–27.
- Nakamoto, “Bitcoin: A peer-to-peer electronic money system,” 2008.
- King, “Primecoin: Cryptocurrency with prime proof-of-work,” July 7th, 2013.
- Dorri, S. S. Kanhere, and R. Jurdak, “Blockchain in web of things: Challenges and solutions,” arXiv preprint arXiv:1608.05187, 2016.
- Narayanan, J. Bonneau, E. Felten, A. Miller, and S. Goldfeder, Bitcoin and cryptocurrency technologies. university Pres, 2016.
- Bogdanov, M. Knezˇevic´, G. Leander, D. Toz, K. Varıcı, and I. Ver- bauwhede, spongent: a light-weight Hash operate. Berlin, Heidelberg: Springer Berlin Heidelberg, 2011, pp. 312–325. F.-S. sense, https://sense.f-secure.com/, [Online; accessed 19-November- 2016].
- Delfs, H. Knebl, and H. Knebl, Introduction to cryptography. Springer, 2002, vol. 2.
- Komninos, E. Philippou, and A. Pitsillides, “Survey in good grid and good home security: problems, challenges and countermeasures,” IEEE Communications Surveys & Tutorials, vol. 16, no. 4, pp. 1933–1954, 2014.
- wired,https://www.wired.com/2016/10/internet-outage-ddos-dns-dyn/, [Online; accessed 10-December-2016].
- Cooja,http://anrg.usc.edu/contiki/index.php/CoojaSimulator/, [Online; accessed 19-November-2016].
- Notra, M. Siddiqi, H. H. Gharakheili, V. Sivaraman, and R. Boreli,