Refine your search
Collections
Co-Authors
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z All
Pasricha, Ruchi
- Linearization of Volterra Series Model Power Amplifier for Wideband WCDMA Base Stations
Abstract Views :331 |
PDF Views:75
Authors
Affiliations
1 CEC, Landran; ECED, Thapar University, Patiala, IN
1 CEC, Landran; ECED, Thapar University, Patiala, IN
Source
Indian Journal of Science and Technology, Vol 2, No 3 (2009), Pagination: 32-33Abstract
Digital pre-distortion techniques are widely used in linearization of RF power amplifiers. In this paper Lookup- table (LUT) type Adaptive Digital pre-Distortion (ADPD) is presented. In this algorithm, an output signal of the Power Amplifier (PA) is used as reference signal. It is used to update the coefficients of the LUT, so that characteristics of the PA, such as temperature dependence, do not have influence on the convergence performances. Simulation results have been presented.Keywords
Digital Pre-distortion (DPD), Error Vector Magnitude (EVM), Power Amplifier (PA), Look-up-tableReferences
- Ding L, Zhou GT. et al. (2004) A robust digital baseband predistorter constructed using memory polynomials. IEEE Trans. on Comm. 52 (1) 159-165.
- Kenington PB and Bennett DW (1996) Linear distortion correction using a feedforward system. IEEE Trans. Veh.Tech. 45, 474-480.
- Kenney JS and Leke A (1995) Wireless report: power amplifier spectral regrowth for digital cellular and PIIS applications. Microwave J. 3. 74-92.
- Ruchi Pasricha and Sanjay Sharma (2008) Digital Predistortion in WCDMA Power Amplifier using Embedded Processor. ICGST Intl. J. Program. Devices, Circuits Systems. 3, 1-10.
- Stapleton SP and Costescu FC (1992) An Adaptive Predistorter for a Power Amplifier Based on Adjacent Channel Emissions, IEEE Trans. Veh. Tech. 41 (1), 49-56.
- Strickland LP et al. (2001) CE phase III final review (July). Raytheon Systems Co.
- Energy Efficient and Reliable WSN based on Improved Leach-R Clustering Techniques
Abstract Views :235 |
PDF Views:0
Authors
Affiliations
1 Lovely Professional University, Jalandhar - 144411, Punjab, IN
2 Chandigarh Engineering College, Chandigarh - 16001, IN
1 Lovely Professional University, Jalandhar - 144411, Punjab, IN
2 Chandigarh Engineering College, Chandigarh - 16001, IN
Source
Indian Journal of Science and Technology, Vol 8, No 16 (2015), Pagination:Abstract
Background/Objectives: Routing in Wireless Sensor Network (WSN) is an important area of research due to its rapidly increasing application in monitoring various kinds of environment by sensing physical phenomenon. The aim of this study is to increase the lifetime of the network. Methods/Statistical Analysis: Enhanced LEACH-R introduces the energy efficiency clustering algorithm for wireless sensor network which is based on Low Energy Adaptive Clustering Hierarchy and removed some of the limitations of the LEACH-R protocol. In this protocol we considered the advance nodes and normal nodes both but the advance nodes have more energy than the normal nodes. Results: The proposed protocol is tested virtually in MATLAB tool. All the nodes are randomly deployed in the region 100*100 m2 and base station is located at the center position i.e. (50, 50). Enhanced LEACH-R protocol gives us the better result as compared to the LEACH-R protocol in terms of energy conservation. Conclusion: This protocol improves the regions of cluster based hierarchical process using heterogeneity parameters like selection of advanced nodes (m) and additional energy factor between normal and advance nodes (a). This protocol has increased the stability time for first dead node and correspondingly the lifetime of last dead node is also increased.Keywords
Advance Nodes, Dead Nodes, Energy Consumption, Normal Nodes, Wireless Sensor Network- Application of Chaotic Functions for Construction of Strong Substitution Boxes
Abstract Views :226 |
PDF Views:0
Authors
Affiliations
1 Lovely Professional University, Jalandhar - 144411, Punjab, IN
2 Chandigarh Engineering College, Mohali - 140307, Punjab, IN
1 Lovely Professional University, Jalandhar - 144411, Punjab, IN
2 Chandigarh Engineering College, Mohali - 140307, Punjab, IN
Source
Indian Journal of Science and Technology, Vol 8, No 28 (2015), Pagination:Abstract
In cryptography, the security of any algorithm relies on the strength of the key used and nonlinear mapping of the original information or data. It is desirable to have resistance against differential cryptanalysis, which assists in providing clues about the composition of keys, and linear secret system, where a simple approximation is created to copy the original cipher characteristics. The objective of the proposed work is to make the existing cipher techniques more prone to cryptanalysis by incorporating the proposed S-box in the design. In this paper, the use of nonlinear functional chaos-based substitution process is proposed which employs a set of differential equations called Lorenz equations with given initial parameters. The performance of the new substitution box is evaluated through simulation and data analytics tool. During testing, it has been found that the proposed technique produces high Standard Deviation (112.84) and negative correlation factor (-0.161) which makes it applicable where security against cryptanalysis is a major concern.Keywords
Chaotic Function, Cipher, Cryptanalysis, Lorenz System, Substitution Box- Performance Enhancement of AODV with Distributed-DSR Routing Protocol in Manet
Abstract Views :251 |
PDF Views:0
Authors
Affiliations
1 Electronics and Communication Department, Lovely Professional University, Jalandhar - 144411, Punjab, IN
2 Electronics and Communication Department, Chandigarh Engineering College, Mohali -140307, Punjab, IN
1 Electronics and Communication Department, Lovely Professional University, Jalandhar - 144411, Punjab, IN
2 Electronics and Communication Department, Chandigarh Engineering College, Mohali -140307, Punjab, IN
Source
Indian Journal of Science and Technology, Vol 8, No 28 (2015), Pagination:Abstract
The proposed system introduces a Distributed Dynamic Source Routing (D-DSR) protocol to secure the network effectively which can inhibit the attacker from copying response of the packets. A multi-path secured routing scheme is used in the work. Reliability and performance of the protocol is measured through packet delivery ratio, attack prevention efficiency, path optimality and routing packet overhead. The results obtained exhibits high security and low false alarm rate.Keywords
Adhoc on Demand Distance Vector Routing, Distributed - DSR, Mobile Adhoc Networks, Performance Enhancement Routing- Energy Conservation in Wireless Sensor Networks through HEECA Mechanism
Abstract Views :211 |
PDF Views:0
Authors
Affiliations
1 Lovely Professional University, Jalandhar - 144411, Punjab, IN
2 Chandigarh Engineering College, Mohali - 140307, Punja, IN
1 Lovely Professional University, Jalandhar - 144411, Punjab, IN
2 Chandigarh Engineering College, Mohali - 140307, Punja, IN