Table of Contents
Original Research Articles
by Muhammad Yasin, Muhammad Junaid Khan
Wirel Commun Technol
2018
,
2(2);
doi: 10.18063/wct.v0i0.447
419 Views,
260 PDF Downloads
In this paper, the concept of blind algorithm with automatic gain control (AGC) is introduced in adaptive antenna system for signal optimization with an aim is to estimate the desired response in adaptive fashion. Blind algorithm with AGC is a two-stage adaptive filtering algorithm; a combination of Bessel least mean square (BLMS) and constant modulus algorithm (CMA). Blind Bessel beamformer with AGC does not require external reference signal to update its weight vectors and step size for convergence but updates itself from own reference signal obtained from the output of CMA. Similarly, step size is obtained from the correlation matrix which is the product of the signals induced in array elements of antenna. BLMS is the modified version of LMS algorithm; based on the non-uniform step size exploiting the asymptotic decay property of Bessel function of the first kind. The output of CMA provides input and reference signals for BLMS that makes it blind. The contributions of this paper include the development of novel blind theory concept and presentation of an AGC method in order to make the Bessel beamformer blind which can update itself electronically through the correlation matrix depending on the signal array vector with the aim to make the signal power constant. |
Original Research Articles
by Faizal Patel, Jaimini Solanki, Vivek Rajguru, Ankit Saxena
Wirel Commun Technol
2018
,
2(2);
doi: 10.18063/wct.v0i0.418
490 Views,
267 PDF Downloads
The video surveillance system is preferred for security monitoring, however, the detection of moving object is a challenging part. In areas where parking space is allotted to a particular vehicle, the wrongly parked vehicle can be recognized. It is noted that the number plates of the vehicle are found in different shape, size and also they are different in color. This makes the detection of the vehicle by their number plates, the most interesting and challenging research topic. Number plate detection is helpful in finding stolen cars, car parking management system and identification of the vehicle in traffic. This paper presents an approach for Number Plate Recognition (NPR) using morphological operation and Sobel edge detection method. In this approach, all the letters and numbers used in the number plate are segmented by using bounding box method. After segmentation, template matching approach is used to recognize numbers and characters. The number plate decoded can be used further for identification, matching and documentation purpose of vehicle details.
|
Original Research Articles
by Jaimini Solanki, Faizal Patel, Vivek Rajguru, Ankit Saxena
Wirel Commun Technol
2018
,
2(2);
doi: 10.18063/wct.v0i0.407
244 Views,
147 PDF Downloads
Since times immemorial, security of data to maintain its confidentiality, proper access control, integrity and availability has been a major issue in data communication. Today images and data transfer in mobile phone communication, e-commerce, Pay-TV, sending private e-mails, transmitting financial information and touches on many aspects of daily lives. We wanted to develop a scheme in which the data embedded in an image and the image itself would be secured from any unauthorized access. This scheme would also be a merit in military and medical services.This paper proposed a scheme for separable reversible data hiding technique in an encrypted image. The original image was encrypted using an encryption key. Then, a data-hider hides the data using the data-hiding key. With an encrypted image containing additional data, if a receiver has the data-hiding key, it can extract the additional data though it does not know the image content and if it has the encryption key, it can decrypt the received data to obtain an image similar to the original one, but cannot extract the additional data. If the receiver has both the key it can extract the additional data and recover the original content without any error by exploiting. This results in the security of data and image privacy. |
Original Research Articles
by V. Anand Kumar 1, Nandalal VIJAYAKUMAR 2
Wirel Commun Technol
2018
,
2(2);
doi: 10.18063/wct.v0i0.446
411 Views,
298 PDF Downloads
This survey deals with LDPC encoding techniques. Different types of error detection and correction codes have been studied. BHC codes, Turbo code, LDPC Codes, Hamming codes are some of the vast classes of codes. Low Decoding complexity and efficient throughput are the achieved by using LDPC codes. Robert G.Gallager introduced this code so LDPC codes are Gallager code. After then Mackay and Neal in 1995 rediscovered LDPC codes because of its bit error performance. It consist of sparse of ones ie., low density of one’s because of this property decoding is simple. The major setback in LDPC codes are Encoding Complexity. WLAN (IEEE 802.11n) and MIMO OFDM are some of the applications of code. This code is a class of forward error correction (FEC) technique that exhibits capacity of impending near Shannon’s limit. LDPC codes are well identified for their capacity-approaching performance The LDPC codes have been selected as forward error correction in application including digital video broadcasting (DVBS2), 10 Gigabit Ethernet (10GBASE-T) broadband wireless access (Wi-Max), wireless local area network, deep-space communications. |
Original Research Articles
by Belal Al-Fuhaidi 1, Hasan A. A. Asaad 2
Wirel Commun Technol
2018
,
2(2);
doi: 10.18063/wct.v0i0.462
292 Views,
146 PDF Downloads
This paper presents efficient methods for rerouting traffic in the Multiprotocol Label Switching (MPLS) network, when a fault occurs in the working link. The proposed methods have been designed to handle single fault based on the protection switching and rerouting techniques. In this paper three algorithms are developed for fault recovery in the MPLS network based on ingress LSR, alert LSR and core LSR. The proposed methods have been simulated using the Network Simulator (NS2) and the simulation results show that the proposed methods significantly improve the network performance in comparison to similar existing methods. |