https://computerjournals.stmjournals.in/index.php/JoCES/issue/feedJournal of Communication Engineering & Systems2024-02-26T09:24:31+00:00Nikita Mishranikita@stmjournals.comOpen Journal Systems<p align="center"><strong>Journal of Communication Engineering & Systems (JoCES)</strong></p><p align="center"><strong> </strong></p><p align="center"><strong>ISSN: 2249–8613</strong></p><p align="center">Click <strong><a href="/index.php/JoCES/about/editorialTeam">here</a> </strong>for complete Editorial Board</p><p align="center"> </p><p align="center"><strong>Scientific Journal Impact Factor (SJIF):</strong> <strong>6.927</strong></p><p><strong> </strong></p><p><strong>Journal of Communication Engineering & Systems (JoCES)</strong> is a journal focused towards the rapid publication of fundamental research papers on all areas of Communication Engineering & Systems. It's a triannual journal, started in 2011.</p><p align="center"> </p><p><strong> </strong></p><p><strong>Journal DOI no</strong>.: 10.37591/ JoCES</p><p><strong> </strong></p><p><strong>Focus and Scope Cover</strong></p><ul><li>Mobile Computing</li><li>Networking Technologies</li><li>Communication Systems</li><li>Intranets</li><li>Enterprise Networks</li><li>LANS, MANS, WANS</li><li>Internet/ Telecommunications</li></ul><p><strong> </strong></p><p><strong>Readership:</strong> Graduate, Postgraduate, Research Scholar, Faculties, Institutions, and in IT Companies.</p><p><strong> </strong></p><p><strong>Indexing: </strong>The Journal is index in DRJI, Journal TOC, Google Scholar, <span>Index Copernicus </span><span>(</span><a href="https://journals.indexcopernicus.com/search/details?id=124971" target="_blank">ICV: <span>58.77</span></a><span>)</span></p><p> </p><p><strong>Submission of Paper: </strong></p><p><strong> </strong></p><p>All contributions to the journal are rigorously refereed and are selected on the basis of quality and originality of the work. The journal publishes the most significant new research papers or any other original contribution in the form of reviews and reports on new concepts in all areas pertaining to its scope and research being done in the world, thus ensuring its scientific priority and significance.</p><p> </p><p>Manuscripts are invited from academicians, students, research scholars and faculties for publication consideration.</p><p> </p><p>Papers are accepted for editorial consideration through email info@stmjournals.com or <span>deeksha.sharma</span>@celnet.in</p><p><strong> </strong></p><p><br /> <strong>Abbreviation: </strong><strong>JoCES</strong><strong><em></em></strong></p><p><em><br /> <br /> </em><strong></strong></p><p><strong>Frequency</strong>: Three issues per year</p><p> </p><p><strong><a href="/index.php/JoCES/about/editorialPolicies#peerReviewProcess">Peer Reviewed Policy</a></strong></p><p align="center"><strong> </strong></p><p><strong><span style="text-decoration: underline;"><br /></span></strong></p><p><strong><span style="text-decoration: underline;"><a href="/index.php/JoCES/about/editorialTeam">Editorial Board</a></span></strong></p><p> </p><p> </p><p><strong><a href="http://stmjournals.com/pdf/Author-Guidelines-stmjournals.pdf">Instructions to Authors</a></strong></p><p><strong>Publisher:</strong> STM Journals A division of: Consortium eLearning Network Private Ltd</p><p><strong>Address:</strong> A-118, 1<sup>st</sup> Floor, Sector-63, Noida, Uttar Pradesh-201301, India</p><p><strong>Phone no.:</strong> 0120-4746-214/ Email: nikita@stmjournals.com</p>https://computerjournals.stmjournals.in/index.php/JoCES/article/view/1116Integrating Sensor Technologies and Machine Learning for Detection and Mitigation of Structural Deformity and Slope Failure in Opencast Mines2024-02-26T07:34:42+00:00Surajit Mohantymohanty.surajit@gmail.comSubhendu Kumar Panipani.subhendu@gmail.comNiva Tripathynivatripathy@driems.ac.in<p><em>With furtherance in the mining industry, accidents due to slope failure are frequent in mining sites. Slope instability, a complex process, seriously threatens the miner’s life and properties. The damage inflicted by slope failures in the recent past has pulled the attention of authorities toward implementing disaster risk reduction measures. This research aims to develop an innovative approach that combines sensor technologies and machine learning techniques to detect and mitigate structural deformity and slope failure risks in opencast mines. By deploying a network of sensors, such as inclinometers, strain gauges, and accelerometers, data on various parameters related to slope stability and structural integrity can be collected in real-time. This data will be processed and analysed using advanced machine learning algorithms to identify early warning signs of potential deformities or failure. The proposed research seeks to enhance safety measures, minimize operational disruptions, and optimize maintenance strategies in opencast mines by providing timely alerts and actionable insights for risk mitigation.The approach or method used in slope failure is considered legitimate when it predicts the slope’s failure time before its actual failure. This research is paramount in mitigating the risk associated with slope failure. This study seeks to showcase the practical implementation of Machine Learning techniques for accurately forecasting slope structure failures. ML classification approaches havebeen produced in this study to forecast the factor of safety of slopes using various geometrical parameters. The performance of ML models is examined and compared through quality metric parameters.</em></p>2024-02-06T12:12:42+00:00Copyright (c) 2023 Journal of Communication Engineering & Systemshttps://computerjournals.stmjournals.in/index.php/JoCES/article/view/1115Driver’s Safety Technology Using Machine Learning2024-02-26T07:31:14+00:00Varsha Kiran Bhosalevkbhosale21@gmail.comRajani Mahindra Mandharerajanimandhare80@gmail.com<p><em>Nowadays, machine learning is mostly used in personalized recommendation systems. The use of machine learning to model the complex user-item interaction function is a trend in the current recommendation domain. This study outlines research carried out in the realm of computer science and engineering to develop a system for detecting driver drowsiness. The main aim is to prevent majority of traffic accidents caused by driver fatigue and drowsiness, fire and smoke. Our proposed system provides a solution to the limited implementation of the various techniques such as machine learning and Arduino that are presented in our system. Therefore, our system implementation provides a realistic understanding of the system's operation and suggests improvements that could be done to increase the system's overall usefulness. To facilitate additional improvement in the aforementioned area and attain utility at better efficiency for a safer roadway, the report also presents a summary of the observations made by the authors.<strong></strong></em></p>2024-01-29T05:26:53+00:00Copyright (c) 2023 Journal of Communication Engineering & Systemshttps://computerjournals.stmjournals.in/index.php/JoCES/article/view/1101A Unique Approach for Disc Encryption Based on Data Matrix2024-02-26T07:31:14+00:00Areeba Ramzanareebaramzan03@gmail.comHifsa Mobeenareebaramzan03@gmail.com<p><em>The number of cloud users is growing due to contemporary facilities and technology. The Internet and cloud computing are the most often used categories nowadays. User privacy is a concern in cloud computing. Various approaches are being used to protect the data from intruders. This article uses a key to protect data that is comparable to plain text. The plain text and the key are partitioned into a matrix with different row and column sizes as the key matrix. When the size of two simple matrices is different. To encrypt the data, many formulae have been devised. It identifies the equation and encrypts it further by adding it to the disc equation. This method can be simply calculated to adjust the matrix where the character-specific values are supplied, and the data may be encrypted and decrypted. After the article, a comparison of other papers is presented, and the paper is concluded based on suggested work, with the discussion of how the proposed work differs from prior ones.</em></p>2023-12-21T06:09:45+00:00Copyright (c) 2023 Journal of Communication Engineering & Systemshttps://computerjournals.stmjournals.in/index.php/JoCES/article/view/1100A Machine Vision Approach for Geofence-based Adaptive Friction Modulation in Connected Semi-autonomous Vehicles2024-02-26T07:31:14+00:00Ushaa Eswarandrushaaeswaran@gmail.comVivek Eswaranvivekkeswaran@gmail.comKeerthna Muralikeerthnamurali.09@gmail.comVishal Eswaranvishalspost@gmail.com<p><em>Safeguarding vulnerable road user (VRU) safety necessitates fail-safes preventing collisions from semi-autonomous vehicles. Geofencing allows service-zones definition but introduces friction discouraging adoption. This paper details an onboard vision model detecting VRUs by helmet status, triggering reactionary neuro-modulations of vehicle maneuverability. The architecture encompasses a YOLOv3 detector determining pedestrian/bicyclist crossing intent through path extrapolations, calibrated using lidar-fusion correcting distance estimates. The subsequent velocity governor adapts acceleration profiles based on predicted exposure risks, verified through hardware-in-loop testing. Ease-of-use implementations will encourage voluntary adoption of potentially life-saving technologies meeting pedestrian fatality reduction goals.</em></p>2023-12-21T06:08:45+00:00Copyright (c) 2023 Journal of Communication Engineering & Systemshttps://computerjournals.stmjournals.in/index.php/JoCES/article/view/1099An Interactive Animatronics for Design and Implementation with Analysis2024-02-26T09:24:31+00:00Netra M. Deshpandemnetras51928@gmail.comKrishna T. Madrewarmnetras51928@gmail.com<p><em>Animatronics is a technology that involves the use of robotic devices to create life-like movements and actions in mechanical figures. In recreational games, the animatronic should be recognized as human companions in order to establish effective interaction situations to improve the recognition and performance of as a mediator for relationship. This work covers the design and implementation of human recognition of an electric dragon using a depth camera (Carmine by Prime Sense), an open environment, Java-based program process, and Adriano microcontroller. Using data from the depth camera, a person was identified with approximately skeletal data. Depending on the movement of the event, the program will track one or more people in the field of view of the camera. Of those watched, shared jobs were classified for private use. It includes all types of joints of person as well as dragons. Italso hasmany types of realistic effect like sound, movement, etc. This animatronic design will enable future research into the effectiveness of interactive content in the learning environment.</em></p>2023-12-21T06:07:44+00:00Copyright (c) 2023 Journal of Communication Engineering & Systemshttps://computerjournals.stmjournals.in/index.php/JoCES/article/view/1082Revolutionizing Agriculture: Integrating IoT, Machine Learning, and Image Processing for Smart Farming2023-12-01T10:46:05+00:00Namrata Deshmukhdeshmukhnamrata17@gmail.comRohit Deshmukhdeshmukhnamrata17@gmail.comAditya Shelkedeshmukhnamrata17@gmail.comChinmay Jadhavdeshmukhnamrata17@gmail.comAbhaysinh Bhosaledeshmukhnamrata17@gmail.com<p><em>Precision agriculture, characterized by data-driven decision-making, has revolutionized modern farming practices. This abstract explores the integration of sensor monitoring, machine learning, and image processing to enhance agricultural efficiency and sustainability. In precision agriculture, a network of sensors continually collects vital environmental data, including temperature, humidity, rainfall, sunlight, soil moisture, and conductivity. The real-time data supplied by these sensors empowers farmers to make knowledgeable choices concerning irrigation, fertilization, and pest management. This data-centric strategy reduces resource inefficiencies while optimizing crop yields. Machine learning algorithms analyze the sensor data, learning from historical patterns and optimizing crop management. By considering factors such as weather forecasts and soil conditions, these algorithms predict crop growth, allowing farmers to plan cultivation strategies effectively. Furthermore, image processing technology plays a crucial role in crop disease prediction. Phone cameras record high-quality images of fields, which are subsequently analyzed to spot indications of diseases, nutrient deficits, or pest invasions. This prompt identification facilitates precise interventions, lowering crop losses and decreasing the necessity for chemical remedies. In summary, precision agriculture leverages sensor monitoring, machine learning, and image processing to revolutionize farming. It empowers farmers with real-time data for informed decision-making, ultimately improving crop yields, resource efficiency, and sustainability in agriculture.</em></p>2023-11-03T08:32:19+00:00Copyright (c) 2023 Journal of Communication Engineering & Systemshttps://computerjournals.stmjournals.in/index.php/JoCES/article/view/1081The Role of Advanced Wireless Technologies in the Evolution of 5G and Beyond2023-12-01T10:46:05+00:00B. M. Rajeshrajenlight@gmail.comMahasuwetha K.rajenlight@gmail.comVidharshana M.rajenlight@gmail.comSangami M. R.rajenlight@gmail.com<p><em>The advent of 5th-generation wireless technology has ushered in notable improvements in efficiency and speed, promising significant advancements in the wireless tech domain. The demand for 5G is on the rise, driven by factors like a burgeoning user base, high-speed requirements, intricate receiver systems, and more. While 4G is currently available, the continuous influx of users and devices is gradually saturating the 4G spectrum, making the need for 5G technology increasingly apparent. Several countries, including the United States, South Korea, Sweden, Turkey, Japan, and China, have already embraced cellular and telecommunications technologies, and experts continue to develop this cutting-edge technology.</em></p>2023-10-31T10:43:49+00:00Copyright (c) 2023 Journal of Communication Engineering & Systemshttps://computerjournals.stmjournals.in/index.php/JoCES/article/view/1079Future Trends in Cloud Computing for Efficient Data Management Services2023-12-01T10:46:05+00:00Sai Durga Turangimanas.yogi@gmail.comManas Kumar Yogimanas.yogi@gmail.com<em><span lang="EN-IN">This study explores the evolving landscape of cloud computing and its impact on efficient data management, focusing on key trends, technologies, and paradigms that will shape the future of data management in the cloud. It delves into infrastructure evolution, scalable data storage, data processing and analytics, security and compliance, and emerging technologies as essential dimensions Furthermore, it explores the collaborative potential between cloud computing and the Internet of Things (IoT), emphasizing the cloud's function in facilitating scalable, secure, and effective management of IoT data. The study also examines how the combination of Blockchain technology and cloud computing enhances data tracking accuracy, transparency, and security across various domains. Furthermore, it explores the pivotal role of cloud computing in managing trained deep learning models for online and distributed analytics applications, emphasizing rapid loading and switching to optimize efficiency. The challenges and considerations in each context are addressed, and future directions in these domains are outlined.</span></em>2023-10-28T05:54:13+00:00Copyright (c) 2023 Journal of Communication Engineering & Systemshttps://computerjournals.stmjournals.in/index.php/JoCES/article/view/1073An Explanatory Theory of Predictive Analysis and Industry 5.0 for Students2023-12-01T10:48:48+00:00Rajesh Yadavry280888@gmail.com<p><em>The incorporation of cutting-edge technologies like artificial intelligence, the Internet of Things (IoT), and robotics into manufacturing operations has given rise to Industry 5.0, often referred to as the "Smart Factory". This fresh approach to manufacturing holds the potential to enhance efficiency, lower expenses, and enhance overall operational effectiveness. Predictive analysis is the key technology that enables Industry 5.0 to achieve these goals by utilizing data and machine learning algorithms to predict and prevent potential issues, optimize production processes, and improve overall efficiency. In this study, we will explore the various applications of predictive analysis in Industry 5.0, including demand forecasting, production optimization, and predictive maintenance, and how these can lead to improved efficiency, cost savings, and better decision making for manufacturing companies. The study will also address the obstacles and upcoming trends in Predictive Analysis within the industrial context 5.0.</em></p>2023-10-21T09:42:00+00:00Copyright (c) 2023 Journal of Communication Engineering & Systemshttps://computerjournals.stmjournals.in/index.php/JoCES/article/view/1001Smart Waste Segregation Using IOT2023-12-01T10:46:05+00:00Bhushan Khanavkarbhushanchkh19compeng@student.mes.ac.inShubham Bhonkarshubhamshga19compeng@student.mes.ac.inRiddhi Bhonkarriddhijabh19compeng@student.mes.ac.inDipti Patildiptiraut@mes.ac.in<p><em>In India, the production of waste is increasing due to population growth and urbanization, leading to pollution. Therefore, it is crucial to discover effective ways of managing waste. A proposed strategy involves the segregation of different types of waste. To implement this, sensors are utilized to identify organic waste, dry waste, and wet waste in the garbage bin. The waste is then sorted on a conveyor belt, with organic waste directed to a separate area, while dry and wet waste is separated using a soil density sensor. This approach ensures efficient and sustainable waste management. Additionally, sensors can be employed to distinguish between wet and dry conditions. The IR sensor detects the object's position during the process, while moisture sensors identify the type of waste based on its moisture content. This proper sorting enables the waste to be placed in the appropriate bins, resulting in reduced levels of harmful gases like carbon dioxide and methane, as well as hazardous waste. Moreover, it reduces the need for manual labour.</em></p>2023-08-14T09:59:57+00:00Copyright (c) 2023 Journal of Communication Engineering & Systemshttps://computerjournals.stmjournals.in/index.php/JoCES/article/view/1036Water Level Detection and Auto-cutoff2023-07-01T11:57:25+00:00Satyam Mishra2021pcecysatyam050@poornima.orgSandeep Kumawat2021pcecysatyam050@poornima.orgRohandeep .2021pcecysatyam050@poornima.orgKshitij Garg2021pcecysatyam050@poornima.orgDevendra Nath Pathak2021pcecysatyam050@poornima.org<p>The focus of this study is to explore Internet of Things and implement it to overcome a daily and reallife challenge. Additionally, we will talk about potential barriers to development. Throughout the study, we would cover the concept of Internet of Things, dealing with the definitions given in the past. We would also talk about the basic communication models of IoT (Internet of Technology) Devices. Moreover, we would consider a real-life problem, which is encountered by almost every person and the problem which may be against sustainable development in the future. Further, we would talk about a possible solution to the problem using the technology. Towards the end, we would be knowing the challenges in the sector and the future scope of the technology and the project. The study would lead to a strengthened concept of Internet of Technology as well as an idea of how a challenge can be overcome by the technology. The Internet of Things does, however, also come with challenges that could prevent its potential benefits from being fulfilled. Catchy headlines regarding the Internet-connected devices being hacked, surveillance issues and privacy concerns have already attracted people’s interests. Technical challenges must be overcome in addition to extra policy, legal, and development issues.</p>2023-06-13T09:11:24+00:00Copyright (c) 2023 Journal of Communication Engineering & Systemshttps://computerjournals.stmjournals.in/index.php/JoCES/article/view/1033Cryptography of 5th Generation Network Security Attacks in D2D Communication: A Review2023-07-01T11:57:25+00:00Sohail Ahmadsohailtanveer.ncbae@gmail.com<p>Cryptography is the science for hiding the secret information. Cryptography is a technique/method that allows data to be sent in a secret and a secure form. In the present era, 5G technology is the most prominent technology in the network domain. However, it was said to be available in 2020, but still there are many views of expected features, benefits, and threats in 5G. 5G is a promising technology that will help in higher connectivity and D2D communication. It will improve all existing technologies. We can expect that in future, 5G technology will face some challenges in terms of security attacks and privacy issues. D2D communication is one of the key components of 5G. In this study, the researcher describes the security attacks of 5G which commonly occur in Device-to-Device communication. Security attacks must be there in all kinds of communication, especially when it comes to a wireless communication. This study is based on the review of current work which has addressed the challenges of 5G technology and security attacks in D2D communication.</p>2023-06-09T06:56:19+00:00Copyright (c) 2023 Journal of Communication Engineering & Systemshttps://computerjournals.stmjournals.in/index.php/JoCES/article/view/1034Product Recommendation System Powered by Artificial Intelligence2023-07-01T11:57:25+00:00Vaishnavi Rajpal BiradarBiradarvaishnavi2@gmail.com<p>The recommendation system is a mysterious tool that analyses a group of users and suggests products they might like. The main purpose of the recommender system is to generate useful recommendations to a bundle of users or items or products that might attract them. Recommendation for books on Amazon, or movies on Netflix, or some products on other web sites are real-world examples of functions of industry-strength recommender systems. Such a recommendation system's design is influenced by the platform and specific properties of the available data. The goal of the recommender system is to help consumers or users and to learn about new products and desirable ones among their choices.</p>2023-06-08T00:00:00+00:00Copyright (c) 2023 Journal of Communication Engineering & Systemshttps://computerjournals.stmjournals.in/index.php/JoCES/article/view/1032Mountaineer’s Health and GPS Tracking System2023-07-01T11:57:25+00:00Krutika Bhaganeshrutikak@mes.ac.inNikhil Bhosaleshrutikak@mes.ac.inAbhishek Gambreshrutikak@mes.ac.inShrutika Khobragadeshrutikak@mes.ac.in<p>Mountaineering is always a fun and adventurous activity. But mountaineering comes with a lot of risks. Mountain climbers have heavy chances of mishaps. Search and rescue efforts frequently fail when a similar tragedy takes place in a rural area or at a high elevation. As a result, the search and rescue team is ignorant of the accident's location or whether or not the individual is alive and, if so, what condition he is in. The real-time monitoring of mountaineers' vital signs and the IoT tracking of their whereabouts are both made possible by this project. This entails live heartbeat monitoring, GPS location tracking, an altimeter, fall detection, and a barometer sensor to assess a mountaineer's health. This information is transmitted via the IoT for live monitoring in the form of SMS to the mountaineer's device using their configured or saved contact number.</p>2023-06-01T09:36:47+00:00Copyright (c) 2023 Journal of Communication Engineering & Systemshttps://computerjournals.stmjournals.in/index.php/JoCES/article/view/1020Deep Learning, YOLO and RFID based Smart Billing Handcart2023-07-01T11:57:25+00:00Kazi Kutubuddin Sayyad Liyakatdrkkazi@gmail.comU. M. Hallidrkkazi@gmail.comVahida Kazidrkkazi@gmail.comSultana Kazidrkkazi@gmail.com<p>Someone visited mall to buy the items they need on regular basis and pay for them. It is needed to verify how many goods are sold out and produce customer’s invoice. When someone visits a store to purchase goods, he/she must exert effort to choose the appropriate items. Furthermore, it is stressful to wait in queue to get the invoice after that. Therefore, we are suggesting a smart cart system created using RFID to keep track of the products that have been bought, as well as online billing transactions. The system will also make product recommendations based on user purchasing patterns from a centralised system. Each cart will be equipped with an RFID reader, and every item in the store will have an RFID tag as part of this system. Centralised systems will be used for web transactions and recommendations. Additionally, an RFID reader for anti-theft purposes will be located at the exit entrance. The proposed system includes a camera that uses deep learning to identify the object and a load cell that weighs the object that is fastened to the shopping cart. The system will generate the bill when the customer scans the item in front of the cart's fixed camera. Numerous methods can be used to implement object recognition. Methods like R-CNN and YOLO use area proposals to create bounding boxes, which are then used to run classifiers throughout. The duplicates are then removed using post-processing methodology. We utilized the YOLO paradigm because of this.</p>2023-05-05T12:35:39+00:00Copyright (c) 2023 Journal of Communication Engineering & Systemshttps://computerjournals.stmjournals.in/index.php/JoCES/article/view/970Strategies to Avoid Illegal Data Access2023-02-28T12:10:46+00:00Muhammad Mubeengiri_anandhi@hotmail.comMuhammad Arslangiri_anandhi@hotmail.comGiri Anandhigiri_anandhi@hotmail.com<p>For companies of all sizes, data security is a top priority. The chance of unauthorized data access increases as technology develops. To prevent unwanted access to their data, businesses must be proactive. This study examines technology solutions, personnel training, and policy enforcement as methods to prevent unauthorized data access. Data may be protected from illegal access using technological solutions like firewalls, intrusion detection systems, and encryption. Intrusion detection systems notify the administrator when suspicious behavior is found, while firewalls serve as a protective border between the internal network and the internet. Even if data is intercepted, encryption makes sure it is safe. Another effective method of avoiding unauthorized data access is employee education. Employees must be taught how to spot hazards like phishing emails and shady websites and react to them. Additionally, they should be taught the right way to utilize passwords and other security precautions. To secure data, organizations should create and implement policies. Policies should set out appropriate data and system use guidelines and provide repercussions for noncompliance. Policies should be evaluated regularly to ensure that they are current and useful. Businesses may prevent unwanted access to their data by installing technology solutions, training staff, and enforcing regulations. Organizations may reduce data breach risk and maintain regulatory compliance by taking these precautions. However, several cyber threats that corporations currently face are examined in this study. It outlines several threat categories, including ransomware, phishing, malware, and data breaches, and how they might affect enterprises. It also looks at methods businesses can employ to reduce the danger posed by these threats, including setting up firewalls and antivirus software, attending frequent security awareness training sessions, and implementing robust authentication systems.</p>2023-01-27T00:00:00+00:00Copyright (c) 2023 Journal of Communication Engineering & Systemshttps://computerjournals.stmjournals.in/index.php/JoCES/article/view/972Real-time Crop Monitoring Using Internet of Things2023-02-28T12:10:46+00:00C. Vinay Kumarchagantivinaykumar@gmail.comD. Srinivasa Raodsraoece@jntuh.ac.in<p>IoT has been deployed in cities, and it is already playing an important role in transforming agriculture from such a manual process to an automated and remotely controlled one. New developments within Internet of Things and changes in agriculture have helped satellite agriculture and prepare farmers for the challenges of precision and sustainable agriculture. Data may be collected remotely from a wide variety of sensors put in the field thanks to the Internet of Things. Bug population density, pest detection, and crop growth are a few of the sensors that may be used on soil. IoT and smart phones allow farmers to monitor their farms from afar. Nodes in wireless sensor networks are used to gather environmental data and information; send data to both the ZigBee server node afterwards. When the central node receives and processes all of the gathered data. Farm operations may be monitored and controlled using microcontrollers. To get a better idea of how things are going in the field, cameras are set up. Thanks to smartphones, farmers can monitor their fields at any time and from anywhere. A farmer's workload is reduced, productivity is increased, money and time are saved and the ability to automate agricultural processes and monitor them from a distance is provided through the Internet of Things. A variety of typical agricultural IoT sensor monitoring network applications are examined in this research, which aims to provide a solid foundation for future smart agriculture using cloud computing.</p>2023-01-27T00:00:00+00:00Copyright (c) 2023 Journal of Communication Engineering & Systemshttps://computerjournals.stmjournals.in/index.php/JoCES/article/view/973IoT-based Home Appliances: An Overview2023-02-28T12:10:46+00:00Amar Deep Nishadamardeepnishad8@gmail.comAmit Kumaramardeepnishad8@gmail.comAshish Bhargavamardeepnishad8@gmail.comAnand Singhamardeepnishad8@gmail.com<p>The internet of things (IoT), the next-generation internet, gives people a comfortable way of life by managing and interacting with remote controls for household appliances. With standards expanding primarily for wireless communication between devices and gadgets in human life, commonly referred to as things, to aim a product using the standard technology that will be useful to the lives of others, is a huge contribution to society. IoT-based home appliances can be easily managed from a distance, making it a must-know and interesting technology and business opportunity. The microcontroller to be used in the prototype is NodeMCU Esp8266 making use of the electrical appliances of the home that can be controlled and managed.</p>2023-01-27T00:00:00+00:00Copyright (c) 2023 Journal of Communication Engineering & Systemshttps://computerjournals.stmjournals.in/index.php/JoCES/article/view/974Two Phase Retrial Queue Evaluation Using DEMATEL (Decision Making Trial and Evaluation Laboratory)2023-02-28T12:11:27+00:00Sathiyaraj Chinnasamysathiyaraj@restlabs.inM. Ramachandransathiyaraj@restlabs.inPrabakaran Nanjundansathiyaraj@restlabs.inVidhya Prasanthsathiyaraj@restlabs.in<p>In this study, retrial queues are characterized by calls that detect that all servers are busy joining the review team, and retrying their demands in random order and at random intervals. If the server is found to be busy, customers can join the review team at a random time. But they keep making the same demands, at random or at set intervals. Recurring queues are widely used to model many realworld situations in telephone switching systems, internet access, call centers, telecommunications networks, and computer systems. Clients not accessing the server are forced to leave the service area. Diagrams can also be used to visualise the structure of complex causal relationships. In order to identify the causal connections between strategic criteria, this DEMATEL method gathers collective knowledge. This model is particularly realistic and scalable. It gives a vague DEMATEL version below the panel selection to solve the power area selection problem, in which reviews of various options under precise subjective houses and all house super weights are expected in linguistic values denoted by ambiguous numbers. Alternatives: stochastic decomposition, steady-state distribution, server vacations, server setup times, and waiting time distribution. Evaluation preferences: stochastic decomposition, steady-state distribution, server vacations, server setup times, and waiting time distribution. In this analysis using DEMATEL method, as a result, random decay is ranked first, while server vacations are ranked last. It determines the solution with the longest distance from the optimal solution and the negative-optimal solution, but the comparison of these distances is not considered significant.</p>2023-01-27T00:00:00+00:00Copyright (c) 2023 Journal of Communication Engineering & Systemshttps://computerjournals.stmjournals.in/index.php/JoCES/article/view/971Li-Fi’s Marketplace in the Future2023-02-28T12:10:46+00:00Satish Parmar2021pietcssatish154@poornima.orgShubham Tharwan2021pietcssatish154@poornima.orgSaurabh Pathak2021pietcssatish154@poornima.org<p>In this work, we are describing our project on the Li-Fi system. The full form of Li-Fi is “light fidelity”. It is the forerunner of Wi-Fi. Li-Fi is a type of data transmission technology that will be used in the future because of its causes and benefits. Wi-Fi and Li-Fi are not similar to each other. There are many differences between them in every aspect. In terms of speed, Li-Fi is more than 50 times faster than Wi-Fi. According to my point of view, due to its speed and non-electromagnetic behavior, we get lots of advantages from it. The user of Li-Fi enjoys it at lower costs because of its lower energy consumption. Also, due to the fast speed of light, the transmission of data and information is 100 times faster than Wi-Fi. This hybrid network connects the high-speed data transmission of Li-Fi with the range of Wi-Fi. Visible light communication is used as a wireless communication technology. When Wi-Fi is active, a user can be transferred from one access point to another via a mobile connection without any loss. Li-Fi is a highly demanded technology compared to Wi-Fi in the future, but the problem is coverage area. The coverage area of Li-Fi is equal to one building area. When it is larger than a building, due to Li-speed, Fi’s the entire world uses it. The Li-Fi makes high-speed network connectivity with security devices using radiation of light. The user of Li-Fi enjoys heavy-speed connectivity on their system. The Li-Fi and Wi-Fi technologies are the same; both are used to share information without the use of any wire. In this technology, Li-Fi requires the following components for use in wireless sharing of data: (1) lamp driver, (2) LED lamp, (3) photodetector.</p>2023-01-18T00:00:00+00:00Copyright (c) 2023 Journal of Communication Engineering & Systemshttps://computerjournals.stmjournals.in/index.php/JoCES/article/view/961An overview of Technologies for the Smart Grid2022-12-19T08:17:22+00:00Mohd Atif Pervez Khanatif7210290308@gmail.comRachit Srivastavasrivastava.rachit94@gmail.com<p>There is broad unanimity regarding the need to enhance the smart grid (SG). To deliver a reliable electricity supply, the SG combines electrical grids and communication infrastructures to create an intelligent electricity network. Numerous cutting-edge communication technologies with the potential to considerably raise the general effectiveness of power grids have been identified for SG applications. The challenges and uses of communication technology in Singapore are covered in this study. Three specific challenges, namely standards interoperability, cognitive access to unlicensed radio spectrum, and cyber security, are present in the adoption of SG communication systems. The idea of a “smart grid” has just come into existence as a solution to the problems with the current electricity grid. The phrase “smart grid” describes a contemporary electric power grid infrastructure that uses high-power converters, automated control, contemporary communications infrastructure, sensing, and metering technologies, as well as contemporary energy management strategies based on the optimization of demand, energy and network availability, among other things, to increase efficiency and reliability.</p>2022-12-06T00:00:00+00:00Copyright (c) 2022 Journal of Communication Engineering & Systemshttps://computerjournals.stmjournals.in/index.php/JoCES/article/view/951Reverse Engineering’s Neural Network Approach to the Human Brain2022-12-19T08:14:40+00:00Kazi Kutubuddin Sayyad Liyakatdrkkazi@gmail.com<p>The organic components of the brain are capable of performing consistently and successfully in noisy situations. Brain components with highly adaptive or flexible interactions that could be low-precision, unpredictable, or excessively simultaneous are used to construct biological circuits. Two of the most remarkable characteristics of brain networks are their propensity to self-organize and their pattern organization. Recent research on neural networks, including artificial neural networks and convolutional neural networks (CNN), has uncovered some fascinating concepts. The only way to comprehend these concepts and use them to solve actual issues is through the construction of largescale, sophisticated brain simulations. With the most recent improvements to low-cost multiprocessor computers, large-scale network simulations are now feasible. Conceptual paradigms of NN methods for designing, generating, and evaluating advanced neural systems are discussed in this study.</p>2022-11-30T12:34:59+00:00Copyright (c) 2022 Journal of Communication Engineering & Systemshttps://computerjournals.stmjournals.in/index.php/JoCES/article/view/941Analysis of Various Tools of Natural Language Processing Based on Developers Perspective2022-12-19T08:14:40+00:00Jatin Takatrakesh@poornima.orgAtrakesh Pandeyatrakesh@poornima.org<p>The subject of natural language method has visible mind-blowing development in current years, with neural network community substitution numerous of the traditional structures. A subset of artificial intelligence known as “natural language processing”, or NLP, analyses, comprehends, and generates natural human languages so that computers can reuse written and spoken human language without resorting to computer-generated language. Semantics and syntax are used in natural language processing, which is sometimes referred to as “computational linguistics”, to assist computers comprehend how people speak and write and how to derive meaning from what they say. In text to speech or speech to text, signature recognition, language detection and translation between natural language are enhanced in past two decades. Sequence prediction by taking input as sequences of amino acids can be used. We have a tendency to suggest a unified neural specification and gaining knowledge of algorithmic rule that is capable of be implemented to numerous natural language method obligations. During this survey paper, we have a tendency to study at the technique of appearing on a file with voice commands (speech to textual content). This survey paper analyses the various tools used of natural language processing based on developer perceptive. In future perspective, there are many scopes on enhancement in natural language processing technique and there deployment in science and society.</p>2022-10-27T10:39:22+00:00Copyright (c) 2022 Journal of Communication Engineering & Systemshttps://computerjournals.stmjournals.in/index.php/JoCES/article/view/940IoT-based Edge Computing Will Breach Data or Make Life Simpler2022-12-19T08:14:40+00:00Bijendra Singh Khangarot2018pietcsbijendra38@poornima.orgAbhishek Dadhich2018pietcsbijendra38@poornima.org<p>Security is critical in today’s world since we have sensitive and confidential data that we do not want to share with anyone, yet adversaries attack our data and steal our identities. Similarly, with Internet of things (IoT), attackers attack devices or communication networks and steal data. Regardless of the source of the data, most current systems for cloud-supported, edge-data analytics employ rigorous bottom-up analytics approaches. Data are frequently generated at the infrastructure’s edge and then moved to the cloud, where traditional data analytics techniques are used. With the increase in fog computing and related edge computing paradigms such as multi-access edge computing (MEC) and cloudlet, possible solutions for coping with the massive volume of security-critical and time-sensitive data created by IoT are emerging. With this article, we will go through all of the dangers and security challenges in IoT.</p>2022-10-27T10:05:35+00:00Copyright (c) 2022 Journal of Communication Engineering & Systemshttps://computerjournals.stmjournals.in/index.php/JoCES/article/view/939Investigating the Role of Ontologies to Develop Augmented Intelligence Applications2022-12-19T08:14:40+00:00Manas Kumar Yogimanas.yogi@gmail.com<p>This paper presents about knowledge representation utilizing ontologies to empower augmented intelligence (AUI) for Systems Engineering. Innovation patterns show new strategies and apparatuses for advanced designing will fuse AUI. Machine learning (ML) methods uphold arrangement, bunching, and affiliation distinguishing proof, yet battle to explain the reasoning for dynamic knowledge entities and their crucial representation. Knowledge representation assumes a critical part in applying this kind of Artificial Intelligence (AI). Ontologies equip the researchers with the benefit of knowledge description and representation so that intelligent applications can be designed in efficient way without disregarding its design complexity. With the help of model-based ontologies, AUI application which will be very much flexible will be highly useful for designing even model free frameworks. The semantic web innovations equipped with ontologies will help in knowledge discovery in turn leveraging the design of AUI applications. AUI applications are heavily CPU intensive thereby increasing loads on the CPU. In order to decrease this load, the ontologies need to be very thin in terms of processing abilities. It is to be noted that this innovation could likewise have a major and positive impact on heavy exercises in the regions of training, advancement and administrations, just as in management and highly dynamic cycles. Be that as it may, as is consistently the situation with new advances, it is important to consider the advantages, yet in addition any potential dangers can be included for sure. The operational parts of executing augmented intelligence in libraries ought to be re-evaluated with regards to any moral issues that may emerge. This is especially evident with regards to the idea of Transhumanism, which has just been advocated in this article.</p>2022-10-20T09:27:27+00:00Copyright (c) 2022 Journal of Communication Engineering & Systemshttps://computerjournals.stmjournals.in/index.php/JoCES/article/view/906Personality and Behavior Identification Based on Handwriting Analysis2022-06-14T08:47:34+00:00Maahi Khemchandanimaahi.khemchandani@it.sce.edu.inNiharika Shailesh Ghalighaliniharika@gmail.comDisha Dinesh Haldankardishahaldakar5@gmail.comRahul Kiran Sonkarrahulsonkar079@gmail.com<p>Graphing is the process of identifying, evaluating, and understanding a person's personality traits through handwritten patterns. The accuracy of handwriting analysis depends on the skill of the analyst, it is expensive and prone to errors. The proposed approach is therefore focused on building a system that can predict personality traits with the help of machine learning without human intervention. In this project, 657 authors' handwritten samples were taken as datasets. The image uploaded from the user is first pre-processed which makes image data suitable for feature extraction by filtering unwanted attributes, enhancing the quality, and performing transformations. We consider seven handwriting patterns, for image feature extraction by filtering unwanted attributes, enhancing the quality and performing transformations. Image features used for extraction are: (i) Baseline angle, (ii) Top margin, (iii) Letter size, (iv) Line spacing, (v) Word spacing, (vi) Pen pressure and (vii) Slant angle. After extracting all these elements from the image, eight Support Vector Machines are trained that produce the individual personality and behavior of the user. Emotional stability, mental energy or will-power, modesty, personal harmony and flexibility, lack of discipline, poor concentration, non-communicativeness, and social isolation are the eight personality characteristics of a writer that can be predicted with high accuracy.</p>2022-06-14T08:33:08+00:00Copyright (c) 2022 Journal of Communication Engineering & Systemshttps://computerjournals.stmjournals.in/index.php/JoCES/article/view/905Using Machine Learning to Analyze Football Teams and Predict the Outcome of a Football Match2022-06-14T08:47:34+00:00Adish Golechha19bec003@nirmauni.ac.inAkshat Muke19bec003@nirmauni.ac.in<p>Football, as one of the most popular sports on the planet, has always attracted a large number of fans. Over 150 million men and women of all ages play it in over 200 countries. Modern football has seen a paradigm shift from being just one of the most physical sports to now being one of the most complex sports due to the involvement of multiple new factors such as home games, away games, form of an individual, total shots taken, total shots blocked, weather conditions etc. In recent years, the importance of these statistics in football and its usage has been seen by all. In this study, football statistics have been used to predict the outcome of football matches via various machine learning algorithms as well as by analyzing them. A thorough examination of these statistics enables a manager to devise strategies for team management as well as upcoming matches. To calculate accuracy, three Machine Learning algorithms were used: Logistic Regression, Support Vector Machine, and Multinomial Nave Bayes. All three of them were compared and it was observed that the most efficient accuracy was that of SVM which was (61.29%). It was also noted that the accuracy achieved by Logistic Regression (60.9%) was very close to that of SVM.</p>2022-05-26T11:10:04+00:00Copyright (c) 2022 Journal of Communication Engineering & Systemshttps://computerjournals.stmjournals.in/index.php/JoCES/article/view/902Forensic Face Portrait Fabrication and Identification2022-06-14T08:47:34+00:00Akshay Arebailprasadjadhav18dhe@student.mes.ac.inPrasad Jadhavprasadjadhav18dhe@student.mes.ac.inOmkar Wadkarprasadjadhav18dhe@student.mes.ac.inAbhijeet Moreprasadjadhav18dhe@student.mes.ac.in<p>In today's world, the general crime rate is increasing by the day, and law enforcement agencies must discover ways to speed up the overall process and assist them in bringing criminals to justice. Face recognition technology, for example, might be used to identify and authenticate the perpetrator. The traditional strategy is to employ forensic sketch artists' hand-drawn face sketches to identify the offender; updating this would necessitate identifying the culprit by comparing the hand-drawn sketch to the law enforcement department's database. The traditional strategy is to employ forensic sketch artists' hand-drawn face sketches to identify the criminal; updating this would mean using computergenerated face sketches. The sketch is compared to the law enforcement department's database in order to identify the culprit. This approach would have numerous limitations with current technologies and would be time consuming due to a scarcity of forensic sketch artists in comparison to the rising crime rate.</p>2022-05-26T11:08:12+00:00Copyright (c) 2022 Journal of Communication Engineering & Systemshttps://computerjournals.stmjournals.in/index.php/JoCES/article/view/901Study on Virtual Reality in Real Life2022-06-14T08:47:34+00:00Param Choudhariparamc81@gmail.comSanny Darjiparamc81@gmail.com<p>Virtual reality (VR) is sometimes referred to as Virtual Environments (VE) has attracted a lot of consideration in the most recent couple of years. Broad media inclusion makes this interest develop quickly. Despite this, few people actually understand what virtual reality is, what its underlying rules and outstanding issues are. In this study, an authentic outline of augmented reality is introduced, essential wording and classes of VR frameworks are recorded, trailed by utilization of this innovation in science, work, and diversion regions. A canny investigation of run-of-the-mill VR frameworks is finished. All aspects of the VR application, as well as their interrelationships, are examined like input devices, yield devices, and programming. Moreover, human elements and their suggestion on the plan issues of VE are examined. We apply VR in the automotive industry, healthcare, retail, tourism, real estate, learning, development, etc. At long last, the eventual fate of VR is considered in two angles, mechanical and social. New examination bearings, mechanical wildernesses, and potential applications are pointed out. The conceivable positive and antagonistic impact of VR on the existence of normal individuals is estimated.</p>2022-05-26T11:06:47+00:00Copyright (c) 2022 Journal of Communication Engineering & Systemshttps://computerjournals.stmjournals.in/index.php/JoCES/article/view/900Secure Image Backup System2022-06-14T08:47:34+00:00Deepak Yadavvinaymourya28@gmail.comVinay Mauryavinaymourya28@gmail.com<p>The primary reason for developing a backup system is to save files that are important. This is done so that in case if system crashes due to any reason such as hard drive failure or natural calamities, the files can be retrieved later easily. Security is one of the essential/crucial factors when it comes to data, as this data might contain confidential as well as important information. Hence, the backup systems must be secure. Encryption of data is one of the most used data security measures in today’s industry. This study describes about a computer software that stores backups of image files in an encrypted format easily and quickly in a secure manner which can be retrieved later. A simple user interface is provided, using which, user can upload and download the file; it also displays the thumbnail image of the file that is uploaded by the user. When the image is uploaded, the system applies the encryption algorithm on the image and encrypts it; then the image is stored in the database of the software system. When the user downloads the image again, the system automatically decrypts the image file and retrieves it for the user. The algorithm used for encryption and decryption of image files is Advanced Encryption Standard (AES) algorithm. This study also describes how the system uses AES for encryption and decryption of image to make the backup software system more secure.</p>2022-05-26T11:05:04+00:00Copyright (c) 2022 Journal of Communication Engineering & Systemshttps://computerjournals.stmjournals.in/index.php/JoCES/article/view/876Universal Communication Design2022-02-08T10:55:43+00:00Shivam Bansalbansal.shivam06@gmail.com<p>Universal Communication design enables to communicate using variable networks. Using FTP server & many other enhancing applications for WAN. The main objective of this project is to provide the security & reduce the time consumption using CISCO technology. The modules used in Network are briefly discussed. This article provides a secure method for transferring bulk data globally using different tools. Commands and objectives are provides Information transfer through network leads to high possibilities for leakage of some data. So using these communications will allow user for enhancing data sharing without having fearing of data escape. Security of data while transferring is main aim to design such method of communication. This technique allows user to handle multiple user at the same time. Different facts are analyzed technically. This paper comprises of innovative idea of transfer of data in bulk.</p>2022-02-08T10:53:28+00:00Copyright (c) 2022 Journal of Communication Engineering & Systemshttps://computerjournals.stmjournals.in/index.php/JoCES/article/view/875Improvised Diffie Hellman Key Exchange Protocol2022-02-08T10:55:43+00:00Shweta Singhanilkumar@poornima.orgAnil Kumaranilkumar@poornima.org<p>Protecting exchange of data over an insecure network is very crucial to maintain confidentiality. Diffie- Hellman protocol is a fundamental key exchange method and has proved to be a secure mechanism to securely exchange the cryptographic keys. Ralph Markel developed this idea, which has got its name from Whitfield Diffie and Martin Hellman. In this protocol, the recipient and transmitter generate a standard secret key and then start talking to each other over the open channel known to all. Diffie – Hellman secures a set of internet facilities. The transmitter has to confide in the public key cryptosystem while obtaining the recipient's public key and contrariwise and this happens to be a drawback of public key cryptosystem. The current DH algorithm is quite prone to man–in–the–middle attack which is a kind of cyber eavesdropping. The eavesdropper is present in the public channel in MITM attack, the eavesdropper receives both the transmitter and recipient's public key, and sends public keys to the transmitter and recipient that are created by him. This is how MITM takes place in this algorithm. Another attack that is very likely on this algorithm is service denial attack. In this type of attack, the attacker tries to prevent the contact between transmitter and recipient and he may do so either by deleting the messages or miscommunicating both the parties. Many other attacks on this algorithm are possible, such as Outsider attack, Insider attack, etc. We have improvised this algorithm to a next level to reduce the probability of attacks on it. In this paper, we have proposed an upgraded DH algorithm by making use of the notion of the existing DH algorithm to generate a more secure secret key, which is then swapped between the transmitter and the recipient so that a new shared secret key can be created for each message. Obtaining the first secret key’s primitive root would produce the second secret key.</p>2022-02-04T09:22:10+00:00Copyright (c) 2022 Journal of Communication Engineering & Systemshttps://computerjournals.stmjournals.in/index.php/JoCES/article/view/870Obstacle Detection for Automobiles using IoT2022-02-08T10:55:43+00:00Janesh Kumar Chhaniwal2018pietcsjanesh66@poornima.orgAlka Ranialka.rani@poornima.org<p>In today’s world most of the time we encounter the road accidents and these are rapidly increasing day by day. The major cause is the carelessness of the people, especially those people, who do not follow the traffic rules. The metropolitan cities where there is huge population and people having more automobiles. we need to understand how precious our life is and for that we need more advancement in our technologies, one of the most prominent technologies so far is the obstacle detector automobiles which will not only detect the automobiles but also the presence of a human which not only save the life of the humans but also the pets. The robot system has been developed that can perform various tasks for the physically challenged. To avoid collisions with unexpected obstacles, mobile robots use ultrasonic rangefinders for detection and mapping. Describes the obstacle avoidance strategy used for this robot. This strategy relies heavily on the performance of the ultrasonic rangefinder, so we will discuss in detail the impact of these sensors and their limitations on the obstacle avoidance algorithm. The impediment avoidance robotics is used for detecting boundaries and averting the collision. This is an self-sustaining robot. The layout of the impediment avoidance robotic calls for the combination of many sensors in line with their task. Obstacle detection is a main requirement of this self-sustaining robotic. The robotic gets facts from the surroundings thru sensors connected to the robotic. Some sensor devices used to detect obstacles, such as impact sensors, infrared sensors, and ultrasonic sensors. Ultrasonic sensors are ideal for detecting obstacles, are inexpensive and have long distances.</p>2022-02-01T06:50:04+00:00Copyright (c) 2022 Journal of Communication Engineering & Systemshttps://computerjournals.stmjournals.in/index.php/JoCES/article/view/866Comparative Study of Machine Learning Techniques for Intelligent 6G Wireless Networks2022-02-08T10:55:43+00:00Anita Patilanupatil31may@gmail.comSridhar Iyersridhariyer1983@gmail.com<p>With exponential increase in the traffic and corresponding bandwidth demand, there is an immediate requirement to serve this traffic through the high-speed wireless communication networks. To fulfil requirements of the next-generation users, it will be mandatory to resort to use of advanced physical layer solutions, spectral bands at higher frequency, and efficient software enabled intelligent algorithms. In this regard, Machine Learning (ML) algorithms will play a key role in ensuring intelligence within 6G wireless system. In this article, we present a detailed review of the ML techniques which are applicable to the next generation 6G wireless networks. We also highlight the most attractive applications of 6G networks, and conclude by mentioning the importance of adopting ML within the 6G networks.</p>2022-02-01T06:49:44+00:00Copyright (c) 2022 Journal of Communication Engineering & Systemshttps://computerjournals.stmjournals.in/index.php/JoCES/article/view/867Short Communication Downloading a File Effective Path for Previous2022-02-08T10:55:43+00:00Nikhil Rajputdhavalchudasama16@gmail.comDhaval Chudasamadhavalchudasama16@gmail.com<p>The internet is complete of data and the entirety is withinside the sun. Therefore, humans generally tend to down load one or materials. However, now that cyber protection is a pinnacle priority, it's miles very vital to pay near interest to what you're surfing the Internet. You want to exercise exact behavior to defend your non-public data. Always download new software or apps directly from the website that hosts these files. However, if you do not pay close attention to the location from which the file was downloaded, you will be vulnerable to hacking. I don't know what will happen because even trusted platforms can be hacked.</p>2022-02-01T06:48:28+00:00Copyright (c) 2022 Journal of Communication Engineering & Systemshttps://computerjournals.stmjournals.in/index.php/JoCES/article/view/850A Review of Particle Swarm Optimization2021-12-02T05:02:32+00:00Anshika Singhsumit.mathur@poornima.orgSumit Mathursumit.mathur@poornima.orgParticle swam optimization (PSO) is a computational technique that streamlines a problem by attempting to improve the arrangement of an applicant with respect to a given value ratio iteratively. This approaches the problem by having a number of candidate solutions, and then pushes the particles in the search space according to a mathematical equation over the position and velocity of the particles. Researchers and specialists have provided various perspectives and studies on Particle Swam Optimization approaches and with the assistance of certain PSO approaches they have effectively answered numerous genuine questions. A summary of certain versions of PSO has been provided in this paper.2021-12-01T12:20:08+00:00Copyright (c) 2021 Journal of Communication Engineering & Systemshttps://computerjournals.stmjournals.in/index.php/JoCES/article/view/849A Cryptosystem based on Topological Space2021-12-02T05:00:02+00:00Sunil Kumar Kashyap7sunilkumarkashyap@gmail.com<p>The study of surface is topology. This paper uses some characteristics of knot theory and develops a public key cryptosystem. A topologically, algebraically one way trapdoor function-based knot cryptography. A link is a set of one or more closed loops in three-dimensional space. The individual loops are called the components of the link. The loops can be twisted or knotted. If there is only one loop, the link is called knot. The knot theory becomes fruitful after the discovery of Jones Polynomial. These knots are represented by three-dimensional geometry and polynomials both. But here we took an example on those knots, which can be represented by two variables; this is known by HOMFLY polynomial. HOMFLY is the compact version of the first letter of its discoverer, Hoste, Ocneanu, Millette, Freyd, Lickorish, and Yetter. There are several types of knot polynomials. Our proposed cryptography is based on all those knot polynomials, which are fit on the machinery of topology.</p>2021-12-01T12:18:14+00:00Copyright (c) 2021 Journal of Communication Engineering & Systemshttps://computerjournals.stmjournals.in/index.php/JoCES/article/view/837Use of ICT in Language Teaching and Library2021-12-02T05:03:41+00:00Pratiksha V. Gulaskarpratiksha.gulaskar26@gmail.comN. M. Jadhavpratiksha.gulaskar26@gmail.comR. N. Indhepratiksha.gulaskar26@gmail.comLibrary experts need particular data tools (Information Communication Technology) for everyday schedule tasks just as for exploration and scholastic exercises. The most recent gadgets for data correspondence innovation have brought about the quick dissemination of information and have changed the data taking care of exercises in examination and scholarly libraries in India. Examination and scholastic libraries, generally connected with colleges and exploration organizations as focuses of library administrations, have hugely improved with the speedy changes in data correspondence innovation. The rise of recent library advances in ICT has opened up better approaches for collecting, controlling and distributing logical and specialized data. Exploration and scholastic libraries have as of now changed their standard assignments by utilizing compelling and productive data correspondence advances to heighten and coordinate their electronic assets and administrations. Finally, administrators of school and exploration libraries must update their knowledge and skills of innovation in data and correspondence (ICT) to effectively carry out their job of being accountable for library approval.2021-12-01T12:16:51+00:00Copyright (c) 2021 Journal of Communication Engineering & Systemshttps://computerjournals.stmjournals.in/index.php/JoCES/article/view/838Computing Appraisal of Trust Management Techniques in the Internet of Things2021-12-02T04:54:42+00:00Bello Abdulazeez Omeizaaftermymsc@yahoo.comConstance Izuchukwu Amannahaftermymsc@yahoo.comTrust management is an alarming problem when it comes to interconnections and communication of objects online; Internet of Things (IoT). For ten years now, IoTs has become so popular because of its significance effect to human activities and its innovative services to many application domains. Nevertheless, IoTs is confronted with many security issues such as trust management. In spite of the huge jobs of trust the board methods in IoTs, there is still pintsized complete concentrate in this field to resolve the issue. Trust is a firm belief in integrity, reliability, strength, truth, and ability among objects base on direct observations and previous experiences that can be used to decide on the succeeding connections. The existing solutions to the trust issues in the IoTs is not comprehensive enough thus this research has evaluated and organized the various trust management techniques in a very systematic manner for addressing trust issues in the IoTs. This study helped in surveying and discussing the state of art trust management system in a well-organized manner by categorizing trust management techniques into four main group with applicable lines for future research. The paper was designed to review the available techniques in a systematic way. This study reviewed over thirty techniques which are classified into four main classes which was discussed and juxtaposed base on some trust parameters such as privacy, integrity, reliability, adaptability, availability, heterogeneity, accuracy, and scalability. The survey was structured to the following measuring metric; recommendation-based techniques (ReTs), prediction-based techniques (PrTs), policy-based techniques (PoTs), and reputation-based techniques (RepTs). The ReTs attempted to improve scalability and adaptability. The PrTs attempted to improve accuracy. The PoTs attempted to improve accuracy. The RepTs attempted to provide an enhanced scalability of the system. Generally, all the techniques have been able to improve security in one trust metrics or the other but they all have their own limitations.2021-12-01T12:15:13+00:00Copyright (c) 2021 Journal of Communication Engineering & Systemshttps://computerjournals.stmjournals.in/index.php/JoCES/article/view/821Airline Reservation System2021-12-02T05:11:56+00:00Niraj Thagunnanirajthagunna123@gmail.comAn Airline Reservation System is vital on the grounds that it has the solid capacity to diminish blunders that may have happened when utilizing a manual arrangement of reservation and assists speed with increasing the boarding cycle. Carrier reservation system is an electronic framework used to store and recover data and go through with exchanges identified with air travel. The venture is pointed toward uncovering the significance and significance of Airline Reservation Systems. It is projected towards enhancing the relationship between customers and airline agencies through the use of compact and user-friendly Airline Reservation System, and thereby making it feasible for the customers to curate the trips as when they require to such an extent that they can use this product to reserve a spot. Overland Airways has a current Airline Reservation System; however, this paper dissected the issues of the current framework for example. No choice of travelers printing their ticket from the current framework. My motivation for the project came from my enthusiasm and strong urge to learn Java and JavaScript which are the fastest growing technologies in today’s world. The Airline Reservation System project chiefly comprises of two kinds of clients. The clients who access the data given by the site and the manager who alters and updates the data accessible in the site. All the information required for the application is put away as tables in the MySQL worker. It enables the customers to search the available flights, book a ticket, payment and cancel a ticket.2021-07-12T09:19:47+00:00Copyright (c) 2021 Journal of Communication Engineering & Systemshttps://computerjournals.stmjournals.in/index.php/JoCES/article/view/799Security to Home Automation System2021-06-18T11:49:14+00:00Dayanand *dayanand.defence@gmail.comAarushi Aryadayanand.defence@gmail.comWilson Jebersondayanand.defence@gmail.com<p class="Abstract"><em>Home automation makes our lives easier and safer. We connect multiple devices into a single home network to ease our everyday lives. We are adding more gadgets to our homes everyday, which offer many useful features like monitoring,controlling and optimizing home efficiency and saving more. These gadgets are connected to internet and pass data to internet all the time. Just like any other internet-connected device like your PC,they are vulnerable to the rest of the world. “Virtual PrivateNetwork for Home Automation Systems” provides security to home network from outside threats. VPN secures connection of devices to encrypt all the data they are sending and receiving.While setting up VPN in home network, user may face many problems concerning compatibility of different devices, changing default settings and personalizing the network. These problems could lead to a vulnerable network, which can easily be hacked. This could lead to exposing the whole network, hence privacy invasion. To prevent this, customization of home network is necessary by a professional.The proposed system understands the need of professional assistance while connecting all the devices to home network and setting VPN connection. Customized router and VPN service will be provided to the user, from choosing router and VPN service to complete installation and connectivity, everything will be done by a professional. Regular checking of the systems and yearly examination will be performed by him.Sessions for users of automated homes will also be conducted, talking about threats and how to protect themselves.This system highlights the need of a man to optimize the use of machines.</em></p>2021-06-17T12:15:09+00:00Copyright (c) 2021 Journal of Communication Engineering & Systemshttps://computerjournals.stmjournals.in/index.php/JoCES/article/view/801Pandemic as Opportunity: Innovation and Growth in Certain Times2021-06-18T11:48:25+00:00Vikram KumawatVikramkumawat.arya@gmail.comAshesh SharmaVikramkumawat.arya@gmail.comGarvit ParakhVikramkumawat.arya@gmail.com<p><em>The COVID-19 pandemic has had profound consequences on the social, economic and cultural life at the global level. Every sector is affected due to this pandemic situation, in whole world.All companies and institutions have temporarily closed and the economy has become unstable. Schools and colleges also closed temporarily, so studies are also affected. This analysis study concludes that how can we convert this pandemic into an opportunity.The whole world is searching for the solution of this situation; much of the research on creativity and innovation stresses the need for time and effort for creative thought, accomplishments, and innovation implementation.The outbreak of the new Corona virus is demanding a consolidation of both these assumptions. At the same time, new approaches to technological change are also needed, which will have to be developed in a very short time, because there is very little time left. Whatever decisions will be taken in the coming year, they will either bring long lasting value in our life or, in the coming decade which will lead us to walk certain paths. Regarding the techniques which the society previously thought, it needs to be reviewed more before including them in life, such technologies will now rapidly move towards being part of our lives, such as the use of artificial intelligence (AI) in the field of health. The hope is that such technologies will be developed rapidly and made part of our lives.Meanwhile, consumer-related technologies are setting new records of rapid progress, such as video conferencing or financial technology platforms. They will have to undergo more rigorous testing by consumers and governmentsbecause they will be used on the basis of utility</em></p>2021-06-10T11:18:29+00:00Copyright (c) 2021 Journal of Communication Engineering & Systemshttps://computerjournals.stmjournals.in/index.php/JoCES/article/view/812Brief Study of Cybercrime on an Internet2021-06-18T11:47:39+00:00Prof. Dhaval Chudasamadhavalchudasama16@gmail.comRaj Singh Deoradhavalchudasama16@gmail.com<p><em><span lang="EN-US">Cybercrime is a serious challenge to society and is harmful to the individuals who become victims. This research paper engages analysis of the cybercrimes that target individuals on the internet and also examines the motivation of criminals that perform such attacks which include (e. g phishing, scams), online harassment, identity theft, malware, hacking and denial-of-service crimes. Cybercrime is a threat to today’s internet-dependent society and is a huge growing problem. By research, it is found that people are using online banking, online shopping and online social networking. Digital technology provides benefits and it provides a rich environment for criminal activity to steal an identity to the theft of classified government information, also known as hacking. A few short examples include buying and selling illegal software and malware, hacking of servers, corrupting systems that could cost billions to individuals, organizations, and government. Cybercrime refers to any crime performed using a computer or an electronic device, mainly through the Internet. As the Internet has many opportunities to consume and access information. Cyber-attacks have mainly caused damage to banking using a credit card and payment scams. Remember, while working within a business, each person has to take personal responsibility for ensuring cybersecurity. You have to prioritize risks that are likely to affect and team up to create the strongest defence against cyberattacks. The study identified security measures are required as well as knowledge of the potential dangers of the Internet. Various steps are taken to slow down attacks but unfortunately are not able to achieve success. The reasons for cyber-attacks, 1.Countries having weak cyber securities, 2. Criminals use new technologies to attack, 3. Cybercrime with business schemes. Every human being is connected by using the internet and it makes the world small. Awareness should be spread regarding cyber-crimes and strict punishments should be imposed on cyber criminals so that criminals leave the idea to do any crime. It ought to guarantee that laws shaped should be followed appropriately.</span></em></p>2021-06-04T11:21:18+00:00Copyright (c) 2021 Journal of Communication Engineering & Systemshttps://computerjournals.stmjournals.in/index.php/JoCES/article/view/811Design Simulation and Assessment of Low PAPR FBMC System for Energy Efficient 5G Applications2021-06-18T11:47:39+00:00Chhatish Kumarchattishkumar36@gmail.comRaghvendra Patidarchattishkumar36@gmail.com<p class="IEEEAbtract"><em>As of late, filter bank multi-transporter (FBMC) has seemed incredible enthusiasm as an option in contrast to orthogonal frequencies Division Multiplexing (OFDM). FBMC plan has extended Frequency capability and low out of band (OOB) outpourings Compared to OFDM. In any case, FBMC still experiences high positions Peak-to-average power proportion (PAPR) in OFDM frameworks. Some OFDM-based PAPR decrease innovation has been received FBMC framework. In this paper, new advancements for PAPR decrease. The proposed FBMC framework depends on its development Use phase modification (PR) and altered PR (MPR) methods Used in OFDM frameworks. Novel comparable to SC-FDMA (single carrier repeat division) Multiple passageway), essentially unite DFT (Discrete Fourier Transform) Spread reach and FBMC-OQAM (channel bank multi-carrier With balance quadrature adequacy change) simply prompts The unimportant PAPR (top typical force extent) is decreased. Using the single carrier effect of DFT spread, exceptional The condition of the IQ coefficient of each subcarrier (in stage Should be content with the quadrature stage channel. So as to further build the amount decreased PAPR, we produce DFT augmentation and ITSM condition in FBMC waveform and select the one with the most minimal pinnacle power. Regardless of whether there are numerous Candidate age, the fundamental count part, for example, DFT Share with IDFT, simply execute once, in contrast to customary SI (side data) based PAPR decrease Program.</em></p>2021-06-02T11:06:55+00:00Copyright (c) 2021 Journal of Communication Engineering & Systemshttps://computerjournals.stmjournals.in/index.php/JoCES/article/view/800Social Media Intervention in COVID-192021-06-18T11:47:39+00:00Geetanjali Jangidgeetanjali.h02@gmail.comGarvit Parakhgeetanjali.h02@gmail.comPradeep Jhageetanjali.h02@gmail.com<p><em>According to a scientific theory, a terrible pandemic happens every once in a few years. Like an Example in 1720 "Great plague of Marseille", in 1820 "Cholera pandemic",1920 "Spanish Flu", and 2020 "Corona Virus" and like every time, social media has been playing its role in a special way.Social media creates a virtual world through the Internet which the user can access using any platform of social media (Facebook, Twitter, Instagram) etc.Similarly, this time also, social media has brought all kinds of information from door to door in India, which has been closed viz in lockdown for nearly 10 months. Social media is making people aware during the epidemic. The rising outbreak of the corona virus also could not put a break on their working style. Coronavirus is being felt beginning with one individual then onto the following in the world, yet this disease is spreading through WhatsApp, Facebook, Twitter and YouTube.</em></p>2021-05-25T13:11:24+00:00Copyright (c) 2021 Journal of Communication Engineering & Systemshttps://computerjournals.stmjournals.in/index.php/JoCES/article/view/763Text Mining An Introduction, Technology, Techniques and Applications2021-08-05T10:27:41+00:00A. Linda Sherinkousalyakrishnan15@gmail.comKousalyadevi Bkousalyakrishnan15@gmail.comDr. A. Finny Belwinkousalyakrishnan15@gmail.comDr. Antony Selvadoss Thanamanikousalyakrishnan15@gmail.com<p align="center"><strong><em>Abstract</em></strong></p><p><em>This work presents a review of text mining areas, as long as the most familiar techniques and technologies are used., Including the proposals depending on the applications. There exits the various methods and devices/technologies to mine the contents and frequent data for future enhancement and decision-making purposes. The correct usage of right techniques helps for the speed enhancement. It reduces the time and efforts to extract useful information. Some of the most frequented text mining applications are cited. We discuss the existing approaches and then we conclude them as they are different and very supportive in nature. In the sense of that they can able to retrieve different information.</em></p>2021-02-09T11:10:39+00:00Copyright (c) 2020 Journal of Communication Engineering & Systemshttps://computerjournals.stmjournals.in/index.php/JoCES/article/view/762Text Mining Algorithms in Social Media2021-08-05T10:27:41+00:00Kousalyadevi .Bkousalyakrishnan15@gmail.comDr. A. Finny Belwinkousalyakrishnan15@gmail.comDr.A. Linda Sherinkousalyakrishnan15@gmail.comDr. Antony Selvadoss Thanamanikousalyakrishnan15@gmail.com<p align="center"><strong><em>Abstract</em></strong><strong><em></em></strong></p><p><em>Social networks are wealthy in different sorts of substance, for example, texts and multimedia. The capacity to apply text mining calculations viably with regards to content information is basic for a wide assortment of uses. Interpersonal organizations require text mining calculations for a wide assortment of uses, for example, watchword search, characterization, and bunching. While search and characterization are notable applications for a wide assortment of situations, interpersonal organizations have a lot more extravagant structure both as far as content and connections. A great part of the work in the region utilizes either absolutely the content substance or simply the linkage structure. Be that as it may, numerous ongoing calculations utilize a mix of linkage and substance data for mining purposes. By and large, things being what they are, the utilization of a mix of linkage and substance data gives substantially more successful outcomes than a system which depends absolutely on both of the two. This paper gives an overview of social media, categories of social media, and challenges of text analysis in social media, six key tips for using text mining in social media and the algorithms that are used for text mining.</em></p>2021-02-09T11:05:04+00:00Copyright (c) 2020 Journal of Communication Engineering & Systemshttps://computerjournals.stmjournals.in/index.php/JoCES/article/view/761Design of Wireless Sensors for IoT with Energy Storage and Communication Channel2021-08-05T10:27:41+00:00R. Kaliyappancdtrkaliyappan@gmail.comDr. A. Finny Belwincdtrkaliyappan@gmail.comDr.A. Linda Sherincdtrkaliyappan@gmail.comDr. Antony Selvadoss Thanamanicdtrkaliyappan@gmail.com<p align="center"><strong><em>Abstract</em></strong><em></em></p><p><em>The emergence of smart cities is expanding gradually. This research focus on developing efficient energy utilization models and answers for home and places of business based on current sensing and wireless networking technologies. Accessibility of minimal effort sensing and processing modules just as of late created effective wireless correspondence conventions for building robotization applications give the essential enabling instruments to the application domain of smart buildings. Energy utilization mechanization is a compelling use of sensor technology because of the all-inclusive requirement for energy use enhancement in homes and places of business. To build up an energy utilization models and optimization algorithms to minimize energy use gave by the networked sensors, client orders, and framework settings, ongoing pricing information when accessible, and input information accessible from the network. This research paper implements the best optimization model for WSN in smart Buildings for smart cities. </em></p>2021-02-09T10:56:11+00:00Copyright (c) 2020 Journal of Communication Engineering & Systemshttps://computerjournals.stmjournals.in/index.php/JoCES/article/view/770Attendance System Using Smartphone Authentication and Bluetooth Beacons2021-08-05T10:27:41+00:00Abhishek Kumarimabhishek.dev@gmail.comRavi Shankar Pandeyimabhishek.dev@gmail.com<p class="Standard" align="center"><strong><em>Abstract</em></strong><strong></strong></p><p class="Standard"><em>Most of the institute in India takes attendance to track the progress of students and most of them update attendance manually which is just a waste of time. Some of the methods like Biometric, RFID can be implemented but it takes a lot more time and also has a chance of spreading the deadly virus like Sars-Cov-2 [1]. This paper is aimed at updating attendance of students using the student’s smartphone itself, which remove the chances of spreading virus and also saves time because the whole classroom can update their attendance within 10 to 15 Sec. This system will work based on Bluetooth Beacons which is used in indoor positioning system and we can use this to know if a student is in the classroom, this system will also use the Face Detection on Eye blink to avoid proxy attendance by using the student smartphone’s front camera(now a day’s front camera is more common in most of the smartphones) and the last one is the flag variable which will be true if faculty will be in classroom otherwise it will false for the rest time. Flag variable is used to just ensure that faculty is in the classroom because there may be cases when teacher is not available in a classroom at class timing.</em><em></em></p><p class="Standard"><strong> </strong></p>2021-02-09T10:50:31+00:00Copyright (c) 2020 Journal of Communication Engineering & Systemshttps://computerjournals.stmjournals.in/index.php/JoCES/article/view/743Study and Literature Survey of IOT (Internet of Things) Under Different Fields for Next Research Direction2021-08-05T10:27:41+00:00Vinay Bhattvinay10191@gmail.comSanjay Kumarvinay10191@gmail.com<p align="center"><strong><em>Abstract</em></strong></p><p><em>IOT (Internet of Things) is a part of internet-based networking, consist sensors and radio frequency identification (RFID) to build an intelligent device. In present time, IOT is applied on various areas such as agriculture for smart farming, postal for smart postal, health care system for smart healthcare system and independent living in smart homes. IOT work on many advance fields of computer science like cloud computing, machine learning, big data, block chaining etc. The structure of IOT is based on advance hardware as Arduino board and arduino programming software IDE. This literature review paper explains the details of IOT with introduction, structure, system design and application of IOT in various research areas </em></p>2020-12-07T11:47:10+00:00Copyright (c) 2020 Journal of Communication Engineering & Systemshttps://computerjournals.stmjournals.in/index.php/JoCES/article/view/730Mammographic CADe And CADx for Identifying Microcalcification Using Support Vector Machine2021-08-05T10:21:47+00:00G. S. Pradeep Ghantasalav.vinayakumari@gmail.comNalli Vinaya Kumariv.vinayakumari@gmail.com<p>The second most frequent cause of death and disease in women worldwide is breast cancer. Effective detection is a crucial element in the successful treatment of cancer. X-ray mammography is the majorityfrequent method for breast cancer. Screenings because of its convenience, portability, and cost-effectiveness. The CADe and CADx techniques were designed to assist radiologists in improving the detection and screening of breast cancer. The goal is for breast cancer to be changed. These instruments provide a radiologist with a second opinion to help interpret and understand the mammogram images. One of the fundamental basis of death from cancer in women is breast cancer. Optical mammograms accomplish early detection. This analysis should create systems to detect symptoms in breast cancer. The graduating of images in the MIAS database is the image set, the area of interest is defined using the morphology algorithm, the gray level co-occurrence matrix functions were found, and the latter classifies SVM (Support vector machine). The quality of abnormalities (normal or abnormal) in automatic mammograms, with each test in use during the diagnostic process, otherwise has a significance that is 85% inside training data, 60% outside of training data, and 67,5% inside and outside training data. Anomalies are of considerable consistency. Such findings affect the percentage of abnormality accuracy by calculating proof used during the classification process. The extreme levels of the classification measures (benign and malignant) will be calculated for the future.</p><p>Keywords:Support Vector Machine, Biopsy, Digital Mammogram, CAD, Gray Level Matrix</p><p>Cite this Article: G. S. Pradeep Ghantasala, Nalli Vinaya Kumari. Mammographic CADe and CADx for Identifying Microcalcification Using Support Vector Machine. Journal of Communication Engineering & Systems. 2020; 10(2): 9–16p.</p>2020-08-21T07:58:37+00:00Copyright (c) 2020 Journal of Communication Engineering & Systemshttps://computerjournals.stmjournals.in/index.php/JoCES/article/view/733Smart Mirror with remote home automation2021-08-05T10:21:47+00:00Sanika Manchekarsanikam26@gmail.comYogesh Patilyogesh20996@gmail.comGurmeet Singh Raitgurmeetsinghrait@gmail.comUrshali Thakururshali.patil23@gmail.com<p>In this paper, we have described how the smart mirror works, and its implementation. While getting ready for any function or before going out of our house we need to get ready ourselves so we watch ourselves into the mirror, it consume a hefty amount of time so to use that time . Smart mirror have been developed through the use of Raspberry Pie. The Raspberry Pie does the functioning of displaying data on mirror. We can perform various operations by this mirror such as playing music, getting news updates, important events. The mirror uses voice input as a way of input that gets processed to give suitable output. The user can remotely control the home devices using the mobile phone using the messages sent via Telegram which is an instant messenger.</p><p>Keywords: technology, Raspberry Pie, smart mirror, home automation, remote</p>Cite this Article: Sanika Manchekar, Yogesh Patil, Gurmeet Singh Rait, Urshali Thakur. Smart Mirror with Remote Home Automation. Journal of Communication Engineering & Systems. 2020; 10(2): 4–8p.2020-08-06T09:26:37+00:00Copyright (c) 2020 Journal of Communication Engineering & Systemshttps://computerjournals.stmjournals.in/index.php/JoCES/article/view/732Providing Biometric Protection for Iris using Watermark and Visual Cryptography2021-08-05T10:21:47+00:00Omkar kondvilkaromikondvilkar@gmail.comRahul Tongalerahultongle84@gmail.comPooja Patilpoojapatil16@gmail.comKirti Mhamunkarkirtimahamunkar@gmail.com<p>This paper presents a novel security architecture which protects the iris using watermarking and visual cryptography techniques. The iris region is protected using watermarking technique where we are using DCT to embed the watermarked text image into the iris image in the low frequency band. After performing watermarking, the watermarked image is further processed to generate a template using Daugmans method and Gabor filter. The generated template is then gone through another security protection scheme using visual cryptography. Here the template is divided into two shares where one is present with the user and other in database. This is the enrollment module. Now for the Authentication module the user share and the data base share are overlapped and then the template is generated. Now the generated template is matched with the template which was already generated using Daugmans method. If both the templates are matched authentication is provided otherwise the person is unauthenticated. This paper is implemented using Matlab.</p><p><strong>Keywords</strong>: Iris recognition, security, watermarking, visual cryptography, template matching.</p><strong>Cite this Article</strong> Omkar kondvilkar, Rahul Tongale, Pooja Patil, Kirti Mhamunkar. Providing Biometric Protection for Iris using Watermark and Visual Cryptography. Journal of Communication Engineering & Systems. 2020; 10(2): 1–3p.2020-08-05T05:31:34+00:00Copyright (c) 2020 Journal of Communication Engineering & Systemshttps://computerjournals.stmjournals.in/index.php/JoCES/article/view/731Identification of Safest Path using Spatial Analysis2021-08-05T10:21:47+00:00Aaditya Naikaadityanaik98@gmail.comPritesh Parmaraadityanaik98@gmail.comSubhash Mudaliaraadityanaik98@gmail.comMonali Deshmukhaadityanaik98@gmail.com<p>Safety is of critical importance to an individual while travelling. The goal of this project is to provide an effective solution to the masses to ensure their safety when travelling from one place to another. The proposed system is developed by building a robust model by using police FIR data and crime news articles scraped from the web. Techniques from Natural Language Processing(NLP) have been used to convert the unstructured to a form that can be applied to train a machine learning model. The location of a crime is extracted from these articles by using a technique called geo-tagging. The locations extracted from the articles are used map the location of the crime on a map and the occurrences of the crimes at there respective locations are stored. This problem can be now visualized as a graph search problem where the locations of crimes are the vertices and the crime intensities are the edges connecting the vertices. Finally, a shortest path algorithm is applied to find the safest route between two locations.</p><p><strong>Keywords:</strong> Natural Language Processing, Web scraping, Naïve Bayes, Parts of Speech Tagging, Geo- tagging, Safest Path, Word Embeddings.</p><strong>Cite this Article</strong> Aaditya Naik, Pritesh Parmar, Subhash Mudaliar, Monali Deshmukh. Identification of Safest Path using Spatial Analysis. Journal of Communication Engineering & Systems. 2020; 10(2): 17–24p.2020-08-05T05:07:21+00:00Copyright (c) 2020 Journal of Communication Engineering & Systemshttps://computerjournals.stmjournals.in/index.php/JoCES/article/view/729Cloud-Based Smart IoT Integrated Rail Ticketing System2021-08-05T10:21:47+00:00Nalli Vinaya Kumariv.vinayakumari@gmail.comG. S. Pradeep Ghantasalav.vinayakumari@gmail.com<p>Recovery of Missing Ticket is the main idea for planning this development. I've come to this level. Various things include reports on Railway facts Tickets Fare. The project provided installation for the provision of duplicate tickets at the nearest possible time. To receive a double card, the client must go to the Booking Counter to receive the voucher. Evidence of identity and operation must be given to the client. I wanted to computerize the program to prevent the above issues. Customers get Duplicate Ticket as the QRCode picture as the key benefit of computerized devices. Customers will display a Ticket Checker Photo during the ride. The customer will enter the Mobile Security Number when taking a picture of QRCode. "QUEUE" is one of the biggest obstacles for purchasing our commuter rail tickets at the new ticketing station, Tickets for the metro and mono. We still stand in the queue or buy smart cards in this fast-growing world of technology. This would be annoying to wait at a line or miss our cards at times for our suburban tickets. It's not too Can be used to book several device tickets concurrently for us. Our program's fundamental goal is to delete QUEUE in cards Even on the road through various transit networks such as mono, metro, and railways. We may request the same single fare. We will create a program to ensure you get your ticket at your disposal.</p><p><strong>Keywords</strong>: Cloud, Smart ticketing, RFID Scanner, QR Code, Missing Ticket</p><p><strong>Cite this Article</strong> Nalli Vinaya Kumari, G. S. Pradeep Ghantasala. Cloud-Based Smart Iot Integrated Rail Ticketing System. Journal of Communication Engineering & Systems. 2020; 10(2): 25–30p.</p>2020-08-05T04:56:56+00:00Copyright (c) 2020 Journal of Communication Engineering & Systemshttps://computerjournals.stmjournals.in/index.php/JoCES/article/view/567Electronic Voting Machine2021-08-04T12:04:02+00:00Anuradha Kumarianuradhak0016@gmail.comNaveen Ratheeanuradhak0016@gmail.comVikas Maheshwarianuradhak0016@gmail.com<p>This study proposes a complete overview of the voting machine, comparison and issues among the conventional system and EVMs. Voting in election forms the fundamental right of democracy which creates a bridge between the governments and governed. In the current scenario, because of successive advancement in voting methods with technology from ballot paper to EVMs and other methods reduces expense and time, and also increases security and trust of the voter. Most of the voting systems have proven correct but many have concerns and security issues like invalid votes, malicious attack etc. This study proposes an improved voting system based on technology to ensure more reliability and security for user identification of a person, like by introducing biometric or aadhaar link with EVMs.</p><p>Keywords: EVM (Electronic Voting Machine), voting machine, invalid votes, malicious attack, DRE (Direct-recording electronic)</p><p>Cite this Article: Anuradha Kumari, Naveen Rathee, Vikas Maheshwari. Electronic Voting Machine. Journal of Communication Engineering & Systems. 2020; 10(1): 32–41p.</p>2020-05-20T08:34:50+00:00Copyright (c) 2020 Journal of Communication Engineering & Systemshttps://computerjournals.stmjournals.in/index.php/JoCES/article/view/600A Novel Approach of Traffic Management in Software Defined Networking Using Internal Controller2021-08-04T12:04:02+00:00Alireza Hashemia.r.hashemi17@gmail.comSayyed Mahdi Faghih Imanismahdi.imani@gmail.comRasool Sadeghir.sadeghi.2005@gmail.com<p>The complex structure of the current computer networks causes problems in network scalability and management and makes it hard and time-consuming to implement general policies. A new architecture called Software Defined Network (SDN) has been developed to address these problems and challenges. One of the most important issues in SDNs is traffic engineering, which is a good criterion for network performance evaluation. After introducing SDNs and examining traffic engineering and its related challenges in SDN, this study presents two new multi-layer topologies for SDN which use their own customized and dedicated internal controllers to solve the traffic engineering challenge and manage the flow in the network by adding routing features to the switches. The results indicate more efficient management by reducing the delay, increasing the throughput, and ensuring higher accuracy in data transmission.</p><p>Keywords: Software-defined network, traffic engineering, controller, topology update, OpenFlow</p><p>Cite this Article: Alireza Hashemi, Sayyed Mahdi Faghih Imani, Rasool Sadeghi. A Novel Approach of Traffic Management in Software Defined Networking Using Internal Controller. Journal of Communication Engineering & Systems. 2020; 10(1): 22–31p.</p>2020-05-20T08:03:23+00:00Copyright (c) 2020 Journal of Communication Engineering & Systemshttps://computerjournals.stmjournals.in/index.php/JoCES/article/view/112A Precise Clock Synchronization Algorithm in Network2021-08-04T12:04:02+00:00Phurailatpam Devakinandan Sharmadevakinandan.bu@gmail.com<p>To execute a task in a synchronized manner in a distributed setting, we need the common idea of time. To accomplish this intention, clock synchronization is conceptualized. Clock drifting is an intrinsic property of a clock, which necessitates the synchronization. A network consists of nodes, which may execute appropriately or behave badly. The mischievous node may pose difficulty in clock synchronization. We require a method to ease the effect of mischievous nodes. In this study, we present a weighted average clock synchronization algorithm to execute a coordinated activity in a fault-tolerant manner. We use behavior of the node to compute normalized weight in a localized manner, which lies between unit intervals. This weight assignment enables us to contain the effect of misbehavior up to some extent. This algorithm offers better precision while tolerating mischievous nodes. The upper bound of tolerance boundary is one-third of network size.</p><p>Keywords: Distributed, network, precision, clock, synchronization, tolerant, mischievous, drift, weighted average</p><p>Cite this Article Phurailatpam Devakinandan Sharma. A Precise Clock Synchronization Algorithm in Network. Journal of Communication Engineering & Systems. 2020; 10(1): 12–21p.</p>2020-05-20T07:54:40+00:00Copyright (c) 2020 Journal of Communication Engineering & Systemshttps://computerjournals.stmjournals.in/index.php/JoCES/article/view/619Water Quality Management using IoT and Data Analysis2021-08-04T12:04:02+00:00Shubham Avinash Sawantshubham.sawant42@gmail.comVikram Jaiswalshubham.sawant42@gmail.comPrashant Solankishubham.sawant42@gmail.comKrushna Beleraoshubham.sawant42@gmail.com<p>The drinking water crisis is one of the biggest crises in the world. Contaminated water causes deadly diseases creating a health issue. As the world is equipped with new smart technology and data analysis methods, it is important to implement smart water quality management system using internet of things cloud computing and data analysis which will replace the traditional method of water quality management and ensure safe pure drinking water to the society and help Municipal Corporation to control and monitor the quality of water. Also, the system can help to manage the water quality in rural area which will decrease the dangerous diseases such as fluorosis, bone deformities etc. The proposed system will have temperature control; pH monitoring, and turbidity of water will be tested which will give good idea about water quality and help to manage it.</p><p>Keywords: Water quality, data analysis, pH level, rural development, metro city water quality management, turbidity, internet of things, temperature, data analysis, cloud computing</p><p>Cite this Article Shubham Sawant, Vikram Jaiswal, Prashant Solanki, Krushna Belerao. Water Quality Management using IoT and Data Analysis. Journal of Communication Engineering & Systems. 2020; 10(1): 6–11p.</p>2020-05-20T07:12:18+00:00Copyright (c) 2020 Journal of Communication Engineering & Systemshttps://computerjournals.stmjournals.in/index.php/JoCES/article/view/144Radio-Frequency (RF) Energy Transfer and Harvesting Techniques with Rectifier and Antenna2021-08-04T12:04:02+00:00M. Umadeviuma_san2001@yahoo.co.inM. Sangaviuma_san2001@yahoo.co.in<p>Electromagnetic energy has an important role in power and energy industry. As the demand for power increases, need for alternate energy sources are essential. Radio frequency (RF) energy transfer and harvesting techniques becomes one of the solutions. Basic RF harvesting circuit consists of three elements. This can be achieved by using a rectenna combination of rectifier and antenna. The antenna is to receive RF signal and rectifier to convert RF to DC signal in between an impedance matching circuit. This converted power is used by certain low power devices. This study presents possible sources applications and design configuration and current scenarios.</p><p>Keywords: Rectenna, rectifying circuit, RF signal, wireless power harvesting (WPH), wireless sensor network (WSN), coded division multiple access (CDMA)</p><p>Cite this Article: M. Umadevi, M. Sangavi. Radio-frequency (RF) Energy Transfer and Harvesting Techniques with Rectifier and Antenna. Journal of Communication Engineering & Systems. 2020; 10(1): 1–5p.</p>2020-05-20T07:04:00+00:00Copyright (c) 2020 Journal of Communication Engineering & Systemshttps://computerjournals.stmjournals.in/index.php/JoCES/article/view/406Analysis of Dispersion Compensation System for PON using Different Schemes2021-08-04T11:57:03+00:00Apurva Pareekapoorvapareek1993@gmail.comDeepak Bansalapoorvapareek1993@gmail.comRaghvendra Patidarapoorvapareek1993@gmail.com<p>In this paper, dispersion compensation techniques are discussed for better communication. Different schemes like pre-compensation, post- compensation and symmetrical compensation of DCF with NRZ and Manchester modulation format. To compensate the dispersion of fiber, DCF is used. Simulations have been analysed by using OptiSystem 7.0 simulator. Results are compared in terms of BER, Q-factor and total received power.</p><p>Keywords: Dispersion Compensation, Dispersion Compensation Fiber (DCF), Passive Optical Network (PON), Q-factor, BER.</p><p>Cite this Article: Apurva Pareek, Deepak Bansal, Raghvendra Patidar. Analysis of Dispersion Compensation System for PON using Different Schemes. Journal of Communication Engineering & Systems. 2019; 9(3): 28–34p.</p>2020-01-31T10:29:25+00:00Copyright (c) 2019 Journal of Communication Engineering & Systemshttps://computerjournals.stmjournals.in/index.php/JoCES/article/view/606New Solar Panel Design and Aesthetics2021-08-04T11:56:48+00:00Mayank Agrawal2016pietecmayank035@poornima.orgAbhishek Shrimal2016pietecmayank035@poornima.orgPranjali Bohra2016pietecmayank035@poornima.orgParul Dhabria2016pietecmayank035@poornima.org<p align="center"><strong><em>Abstract</em></strong></p><p><em>The obvious choice of sustainable</em> <em>energy source is abundant and could provide security for the future is the sun’s energy. During the last decade, we have seen solar energy generation is taking its place in industries worldwide. The impressive rise of installed solar panels gives a direction for researchers to work on solar panel aesthetics. This paper provides the detailed need for solar panel aesthetics, various technologies which are being used and advancement of solar panel industries. Our study reports the relative importance of aesthetics compared with other attributes namely investment costs, payback period, reliability and expected services as experienced by owners. The goal of our study is to provide insight into the motives of customers to select innovative, aesthetic solar panels.</em></p><p><strong><em>Keywords: </em></strong><em>PV cells, Solar panels, electric energy, organic salt, graphics</em></p><p><em><strong>Cite this Article</strong></em></p><p><em>Mayank Agrawal, Abhishek Shrimal, Pranjali Bohra, Parul Dhabria. New Solar Panel Design and Aesthetics. Journal of Communication Engineering & Systems. 2019; 9(3): 4–7p.</em> <strong></strong></p><p><em><br /></em></p>2019-11-14T08:20:41+00:00Copyright (c) 2019 Journal of Communication Engineering & Systemshttps://computerjournals.stmjournals.in/index.php/JoCES/article/view/605Wireless Sensor Network: Qualitative Analysis of Diverse BlackHole Detection Plans2021-08-04T11:56:48+00:00Upekha Khuntetaupee_ish@yahoo.co.inSunita Guptaupee_ish@yahoo.co.in<p align="center"><strong><em>Abstract</em></strong></p><p><em>Wireless sensor network is a mesh of sensor nodes deployed over an area of interest. </em><em>In wireless sensor network safety plays a critical role. It is also a key concern area imparting an effective challenge to the researchers across the world to find a powerful answer in terms of a protection mechanism closer to the problem. The paper offers the qualitative analysis of various WSN security challenges against a well-known attack better known as black hole attack and their proposed counter mechanisms advised by various researchers world over. The WSN overall performance evaluation is carried out using some of the critical parameters related to the attacks including associated energy. After the analysis, the results have been found to support the fact that the black hole assaults are most difficult to come across in contrast to others despite many techniques used so far.</em><em></em></p><p><strong><em>Keywords:</em></strong><strong> </strong><em>Assaults, blackhole attack, data, malicious node, network security, packet,</em> <em>WSN</em></p><p><em><strong>Cite this Article</strong></em></p><p><em>Upekha Khunteta, Sunita Gupta. Wireless Sensor Network: Qualitative Analysis of Diverse BlackHole Detection Plans. Journal of Communication Engineering & Systems. 2019; 9(3): 16–22p.</em> <strong></strong></p><p><em><br /></em></p>2019-11-14T08:09:17+00:00Copyright (c) 2019 Journal of Communication Engineering & Systemshttps://computerjournals.stmjournals.in/index.php/JoCES/article/view/604Wavelength Division Multiplexing in Optical Networks Using Radio Over Fiber2021-08-04T11:56:48+00:00Swinal Rajkumar Meshram2015pietcsswinal@poornima.orgAmit Kumar Gupta2015pietcsswinal@poornima.org<p align="center"><strong><em>Abstract</em></strong></p><p><em>This paper contains a detailed study about WDM (wavelength division multiplexing) optical networks. The bandwidth, speed and loss of signals in communication have a reason to worry in communication systems; WDM makes the possible solution to resurrect the systems of communications with the help of this technology. The issue emerges when the interest for transfer speed in a fiber optic system surpasses the present limit, without requiring any extra fiber, WDM can help in raising the limit in a fiber optic system. The issues that have been made regarding speed and bandwidth and the methods would be cost-effective with the help of WDM device. The paper provides how WDM can improve the previous innovations in an outgoing manner and generally speaking limit in the communication systems. To improve the quality of the transmission system, Erbium-doped fiber amplifiers have also been investigated. All results achieve good reliability performance and prove the efficiency of the presented model. </em></p><p><strong><em>Keywords: </em></strong><em>Bandwidth, multiplexing, optical networks, radio over fiber, WDM</em></p><p><em><strong>Cite this Article</strong></em></p><p><em>Swinal Rajkumar Meshram, Amit Kumar Gupta. Wavelength Division Multiplexing in Optical Networks Using Radio over Fiber. Journal of Communication Engineering & Systems. 2019; 9(3): 12–15p.</em> <strong></strong></p><p><em><br /></em></p>2019-11-14T07:11:29+00:00Copyright (c) 2019 Journal of Communication Engineering & Systemshttps://computerjournals.stmjournals.in/index.php/JoCES/article/view/603Scrutinizing and Extract the cause of Scaling Concerns for Fin-FET2021-08-04T11:56:48+00:00Vivek Daiya2015pietecvivek@poornima.org<p align="center"><strong><em>Abstract</em></strong></p><p><em>Recent Trend in the adaption of New Technological Innovations suggests that People are looking for Power in compactly sized alternatives which suggest that Devices are shrinking down day by day. With increasing demands of Power to Body ratio, it is becoming difficult for the Researchers to cope up with this current scenario. Fin-FET seems to be a possible alternative to combat these expectations but with every new invention comes its flaws. Scaling down the Fin-FET size brings new challenges to the plate. This Paper reviews some of those common issues and later proposes their possible solutions to overcome them.</em><em> </em></p><p><strong><em>Keywords: </em></strong><em>Fin-FET, Fin-Shape, Parasitic Capacitance, SCE</em></p><p><em><strong>Cite this Article</strong></em></p><p><em>Vivek Daiya. Scrutinizing and Extract the cause of Scaling Concerns for Fin-FET. Journal of Communication Engineering & Systems. 2019; 9(3): 8–11p.</em> <strong></strong></p><p><em><br /></em></p><p><em><br /></em></p>2019-11-14T07:03:11+00:00Copyright (c) 2019 Journal of Communication Engineering & Systemshttps://computerjournals.stmjournals.in/index.php/JoCES/article/view/602Advanced Wireless Communication Technology2021-08-04T11:56:48+00:00Jai Prakash Meena2015pieteejai@poornima.orgHitesh Jain2015pieteejai@poornima.orgRajendra Singh2015pieteejai@poornima.org<p align="center"><strong><em>Abstract</em></strong></p><p><em>The latest iteration of mobile broadband technology 5G stands for fifth-generation wireless technology. The technology of mobile communication started from the first generation and reached to the fifth generation and the next evolution 6G and 7G are the future of mobile communication. This paper includes the evolution of 5G wireless technology as well as focuses on all preceding generations of wireless communication. This paper contains the characteristics and feature of 5G technology. The paper will also provide a basic idea for research in the field of telecommunication technology. It will give a foundation to go for 6G and 7G technologies.</em></p><p><strong><em>Keywords: </em></strong><em>3G, 4G and 5G technology, worldwide wireless web (wwww)</em></p><p><em><strong>Cite this Article</strong></em></p><p><em>Jai Prakash Meena, Hitesh Jain, Rajendra Singh. Advanced Wireless Communication Technology. Journal of Communication Engineering & Systems. 2019; 9(3): 1–3p.</em> <strong></strong></p><p><em><br /></em></p>2019-11-14T06:55:35+00:00Copyright (c) 2019 Journal of Communication Engineering & Systemshttps://computerjournals.stmjournals.in/index.php/JoCES/article/view/571Simple Analysis of Average Monthly Global Solar Radiation in Rajasthan2021-08-04T11:56:48+00:00Sakshi Sharma2016pietecsakshi058@poornima.orgShubham Singh2016pietecshubham064@poornima.orgVivek Kumar2016pietecvivek072@poornima.orgDeepak Sharmadeepak_382@poornima.org<p align="center"><strong><em>Abstract</em></strong></p><p><em>Solar energy is the best form of renewable energy.This article describes an hourly solar radiation estimation method using global, diffuse and ground solar radiation. This paper presents about solar radiation on daily basis at Jaipur, Jaisalmer and Jodhpur, Rajasthan (India) was investigated on an average 7 hours daily sunshine duration basis on the date of 16th of each month of a year. This paper suggests a possible solution for absorbing and exploiting the entire spectrum of solar radiation including ultraviolet radiation along with visible radiation. To measure solar radiation at different locations possible methods are given</em>.<strong> </strong></p><p><strong><em>Keywords</em></strong><em>: Global solar radiation, horizontal surface, sunshine hours</em></p><p><em><strong>Cite this Article</strong></em></p><p><em>Sakshi Sharma, Shubham Singh, Vivek Kumar, Deepak Sharma. Simple Analysis of Average Monthly Global Solar Radiation in Rajasthan. Journal of Communication Engineering & Systems. 2019; 9(3): 23–27p.</em> <strong></strong></p>2019-11-14T06:08:15+00:00Copyright (c) 2019 Journal of Communication Engineering & Systemshttps://computerjournals.stmjournals.in/index.php/JoCES/article/view/414A Survey on Audio Steganography and Audio Cryptography2021-08-04T11:52:12+00:00Aruna J. Solankiamisolanki007@yahoo.co.inPinkal M. Mahantamisolanki007@yahoo.co.inBinal J. Jadawalaamisolanki007@yahoo.co.in<p align="center"><strong><em>Abstract</em></strong></p><p><em>Reliably secure mechanisms are required to protect most untold and blueprint of defense information against vulnerabilities like ID spoofing and unauthorized access to the top most system of a country because of secured access to the Internet and data resources has a high impact in the defense system. For this purpose techniques related to Cryptography and digital Watermarking have been mostly used. For embedding information into objects such as images, audio signals, and video frames, which can be used for media notation, Copyright protection, integrity authentication, and covert communication, digital watermarking techniques have been proposed in recent years. So, digital watermarking techniques can achieve authoritative digital objects by embedding watermarks. But by doing so, confidentiality is not achieved. In cryptography, encryption standards and digital signatures are used to provide confidentiality, authenticity, and integrity to exchanged images. While comparing the two technologies i.e., encryption and digital water marking first are considered a pre protection mechanism, whereas another can considered as a post control mechanism as the image content is still available for interpretation while the remaining is protected. In this paper, we surveyed the literature in the area of cryptography, steganography, watermarking, etc.</em></p><p><strong><em>Keywords</em></strong><strong>: </strong>Cryptography, steganography, encryption, SVD, DWT</p><p><em><strong>Cite this Article</strong></em></p><p><em>Aruna J. Solanki, Pinkal M. Mahant, Binal J. Jadawala. A Survey on Audio Steganography and Audio Cryptography. Journal of Communication Engineering & Systems. 2019; 9(2): 64–68p.</em><strong></strong></p>2019-08-05T11:30:24+00:00Copyright (c) 2019 Journal of Communication Engineering & Systemshttps://computerjournals.stmjournals.in/index.php/JoCES/article/view/569RFID-based Automated Toll Collection System2021-08-04T11:52:12+00:00Mehfuza Holiamsholia@bvmengineering.ac.inZankhana Shahmsholia@bvmengineering.ac.inMilindra Solankimsholia@bvmengineering.ac.in<p align="center"><strong><em>Abstract</em></strong></p><p><em>Electronic Toll Collection (ETC) is a technology that allows for electronic payment of tolls.</em><em> </em><em>One of the most efficient ETC technologies is the RFID technology. RFID-based ETCs permit swift tax collections on-the-go, thereby alleviating the delay problems associated with manual tollbooths. RFID systems make use of RFID readers, RFID tags and a processing system to provide seamless tax collection at tollbooths. RFID-based ETCs are very cost-effective because they are completely automated and low-maintenance structures. So, the expenditures associated with manpower and maintenances are absolutely negligible. This system when coupled with appropriate transceiver mechanism for tax deduction and enhanced security features can be used to eliminate all the issues associated with the manual system, thereby revolutionizing the modern tollbooth systems.</em></p><p><strong><em>Keywords: </em></strong><em>RFID, ETC, microcontrollers</em></p><p><strong>Cite this Article</strong></p><p>Mehfuza Holia, Zankhana Shah, Milindra Solanki. RFID-based Automated Toll Collection System. <em>Journal of Communication Engineering & Systems</em>. 2019; 9(2): 106–110p.<strong></strong></p><p><em><br /></em></p>2019-08-05T11:16:01+00:00Copyright (c) 2019 Journal of Communication Engineering & Systemshttps://computerjournals.stmjournals.in/index.php/JoCES/article/view/415Zoom Based Image Super-Resolution: Using Two Level DWT as Feature Model2021-08-04T11:52:12+00:00Meera D. Doshimeera.doshi82@gmail.comPrakash P. Gajjarmeera.doshi82@gmail.comAshish M. Kotharimeera.doshi82@gmail.com<p align="center"><strong><em>Abstract</em></strong></p><p class="IEEEHeading1"><em>In this paper we present an algorithm of super-resolution (SR) imaging to reconstruct high-resolution (HR) image from sequence of low-resolution (LR) images of static scene captured at the different camera zoom factor. The resultant HR image is constructed at the resolution of the most zoomed LR image. In the proposed approach algorithm uses LR images of the static scene captured at three distinct zoom-factors. Learning based SR technique is used to enhance the spatial resolution of these LR images.</em><strong> </strong><em>For that training dataset comprising three sets of captured images which are LR images, enhances version of LR images-HR1 and enhanced version of HR1 images-HR2. Proposed algorithm use training images in two pairs of datasets LR-HR1 and LR-HR2 to obtain super-resolution of observed image. High-frequency details of the super-resolved image are learned in form of the two-level discrete wavelet transform coefficients of HR training images. The fine textures of the images are conserved with this approach. Finally, the super-resolved version of LR observations, captured at different zoom-factors, are combined. The suggested approach has been trailed on numerous real-world natural images. The results show that the suggested approach is better in both qualitative-SSIM and quantitative- PSNR, MSE manner over existing approaches.</em><strong> </strong></p><p><strong><em>Keywords:</em></strong><strong> </strong><em>Discrete Wavelet Transform (DWT), Learning-based approach, Peak Signal to Noise Ratio (PSNR), Mean Square Error (MSE), Structural Similarity Index (SSIM)</em></p><p><em><strong>Cite this Article</strong></em></p><p><em>Meera D. Doshi, Prakash P. Gajjar, Ashish M. Kothari. Zoom Based Image Super-Resolution: Using Two-Level DWT as Feature Model. Journal of Communication Engineering & Systems. 2019; 9(2):</em><br /><em> 94–105p.</em><strong></strong></p><p><em><br /></em></p>2019-08-05T10:47:55+00:00Copyright (c) 2019 Journal of Communication Engineering & Systemshttps://computerjournals.stmjournals.in/index.php/JoCES/article/view/438Smart Voice Operated Display System2021-08-04T11:52:12+00:00Aaraadhyaa Khodariaaaradhyaa1995@gmail.comApoorva Aggarwal16.apoorva@gmail.comAkash Goyalakashgoyal789@gmail.comMridul Gautammridulgautam97@gmail.comVedansh Bajajvedansh.ved30@gmail.com<p class="Abstract"><strong><em>Abstract</em>—</strong>Smart Voice Operated Display is a real-time information display system which is voice controlled in its nature. As an extension to its source of information GSM is also added to its arsenal to make it more usable and versatile in application. The system is made wireless by using a Bluetooth device to communicate between user and the system. Android App delivers the function of Voice Recognition using AI, which converts user voice into text for this user has to give his/her voice command to control the messages displayed on the LED Screen. The Android App then passes these commands to Arduino MEGA. The Microcontroller then receives these commands using Bluetooth Receiver and decoder. Then these commands are further passed on to the rolling display which is made up of Matrix LEDs. Thus, Bluetooth Module, GSM Module, Arduino MEGA and Scrolling Display are the main components used in this Voice Controlled Display.</p><p><strong><em>Keywords</em>—</strong>Arduino MEGA, Bluetooth Module, GSM, Matrix LED, Scrolling Display, Smart Voice Operated Display.</p><p><strong>Cite this Article</strong></p><p>Aaraadhyaa Khodaria, Apoorva Aggarwal, Akash Goyal, Mridul Gautam, Vedansh Bajaj. Smart Voice Operated Display System. <em>Journal of Communication Engineering & Systems</em>. 2019; 9(2): 88–93p.<strong></strong></p>2019-08-05T09:47:52+00:00Copyright (c) 2019 Journal of Communication Engineering & Systemshttps://computerjournals.stmjournals.in/index.php/JoCES/article/view/418Exploiting Phase of Speech Signal for Speaker Recognition2021-08-04T11:52:12+00:00Pinky J. Brahmbhattpjbrahmbhatt@ldce.ac.inAmi Gandhipjbrahmbhatt@ldce.ac.inK. G. Maradiakishor@gecg28.ac.in<p class="Abstract"><strong><em>Abstract</em>—</strong>Performance of speaker recognition system with feature based on temporal phase is presented in this paper. In the state of the art spectral feature, Mel Frequency Cepstal Coefficient (MFCC) only magnitude of the Fourier Transform of speech signal is considered while phase is ignored. The cepstral coefficients extracted from temporal phase (MFTPC) of speech signal are used as features for speaker recognition system. The performance of MFTPC feature is evaluated on IIT, Guvahati Multi Variability database (IITG-MV) and is compared with the baseline system using standard MFCC features. The performance of MFTPC feature is comparable to MFCC features in terms of identification rate, equal error rate and detection cost function. Fusion of MFTPC with MFCC features improves the performance of the system. Identification rate is improved by 0.10% and EER is reduced by 2% than MFCC only which shows the effectiveness of MFTPC feature.</p><p class="keywords"><strong>Keywords —</strong>MFCC; MFTPC; IITG-MV database; GMM-UBM</p><p><strong>Cite this Article</strong></p><p>Pinky J. Brahmbhatt, Ami Gandhi, K. G. Maradia. Exploiting Phase of Speech Signal for Speaker Recognition. <em>Journal of Communication Engineering & Systems</em>. 2019; 9(2): 81–87p.<strong></strong></p>2019-08-05T09:42:37+00:00Copyright (c) 2019 Journal of Communication Engineering & Systemshttps://computerjournals.stmjournals.in/index.php/JoCES/article/view/429Insights to Big Data and Hadoop: An Introductory Review2021-08-04T11:52:12+00:00Deepika Sooddeepika.coeapplied@cgc.edu.inSukhjinder Kaurdeepika.coeapplied@cgc.edu.inSunil Kumar Chawladeepika.coeapplied@cgc.edu.in<p align="center"><strong><em>Abstract</em></strong></p><p><em>In today’s era, the availability of a plethora of online products like websites, web-portals, e-commerce sites, social-networking sites, etc. give rise to a collection of extremely large and complex dataset known as Big Data. It has emerged with a huge set of unknown prospects and challenges to deal with gigantic amount of data. Big Data has been extremely popular in current fast paced technologically advancing world and has become the fresh attention seeking field for researchers. To extract valuable information from the enormous amount of data available as Big Data, we first have a need to analyze the data. Big Data ensures that the precise information from the data is generated quickly and offers convenience and benefits to the organizations, researchers, and consumers. This paper focuses on introductory insights and overview of Big Data and Hadoop. Its applications and components like HDFS and Map Reduce are also studied in brief.</em></p><p><strong><em>Keywords:</em> </strong><em>Big Data, Hadoop, Five Vs, HDFS, Map - Reduce.</em></p><p><strong>Cite this Article</strong></p><p>Deepika Sood, Sukhjinder Kaur, Sunil Kumar Chawla. Insights to Big Data and Hadoop: An Introductory Review. <em>Journal of Communication Engineering & Systems</em>. 2019; 9(2): 69–75p.<strong></strong></p><p><em><br /></em></p>2019-08-05T09:30:23+00:00Copyright (c) 2019 Journal of Communication Engineering & Systemshttps://computerjournals.stmjournals.in/index.php/JoCES/article/view/490Study and Performance Analysis of Orthogonal Frequency Division Multiplexing with Different Modulation for Rayleigh Channel Model2021-08-04T11:52:12+00:00Rajvirsinh C. Ranarajvisinh.rana@bvmengineering.ac.inAnish A. Vahorarajvisinh.rana@bvmengineering.ac.inRonak R. Vashirajvisinh.rana@bvmengineering.ac.inMehfuza Holiarajvisinh.rana@bvmengineering.ac.in<p align="center"><strong><em>Abstract</em></strong></p><p><em>For the advancement of wireless communication systems, methods such as MIMO, OFDM and integrating them together as MIMO-OFDM are very useful. OFDM is used in numerous wireless transmission standards nowadays. In OFDM, high rate data stream is divided into low-rate streams which are transmitted together over a number of subcarriers.</em> <em>A broadband and frequency-selective channel are transformed into a multiplicity of parallel narrow-band single channels by the OFDM modulation. By introducing a guard time in OFDM symbol, the intersymbol interference is eliminated and OFDM symbol is cyclically extended to avoid inter-carrier interference. When OFDM combines with multiple antennas at the transmitter and the receiver then it results in increased diversity gain as well as in transmission capacity in time-varying and frequency selective channels. Here, performance analysis has been shown on Matlab for Single Input-Single Output Orthogonal Frequency Division Multiplexing Rayleigh Channel Model with PSK,8PSK,16PSK,4QAM,8QAM,16QAM modulation techniques.</em></p><p><strong><em>Keywords: </em></strong><em>OFDM, Rayleigh Channel, FDM, </em>Multicarrier<em> Modulation</em><em>.</em></p><p><strong>Cite this Article</strong></p><p>Rajvirsinh C. Rana, Anish A. Vahora, Ronak R. Vashi, Mehfuza Holia. Study and Performance Analysis of Orthogonal Frequency Division Multiplexing with Different Modulation for Rayleigh Channel Model. <em>Journal of Communication Engineering & Systems</em>. 2019; 9(2): 76–80p.<strong></strong></p><p><em><br /></em></p>2019-08-05T08:22:14+00:00Copyright (c) 2019 Journal of Communication Engineering & Systemshttps://computerjournals.stmjournals.in/index.php/JoCES/article/view/568Bandwidth Extension of Speech Signal Artificially & Transmission & Coding for Wireless Communication2021-08-04T11:52:12+00:00R. N. Rathodrathod_45@yahoo.comM. S. Holiarathod_45@yahoo.com<p align="center"><strong><em>Abstract</em></strong></p><p><em>In today’s next generation wireless communication, decoded speech quality at recipient side initiate quiet and slim; mainly recognized to intrinsic band limitation (300-3400 Hz). so as to increase clearness and genuineness of improved speech signal. Narrowband speech coders be supposed to promote to wideband coders supports bandwidth of 50-7000Hz.</em><strong> </strong><em>extensive time duration has been left for advancement from narrowband to fully wideband well-suited systems. Many smart devices at the present support high-quality speech communication services at super-wide bandwidths. Often, however, speech quality is degraded when they are used with networks or devices which lack super-wideband support. Artificial bandwidth extension can then be used to improve speech quality.</em> <em>Wide band improve speech reproduction with no reaching the natural quality offace-to-face exchange or the high quality of professionally recorded speech. now a day's various coding algorithms have been urbanized for SWB (50–14,000 Hz) and FB (20–20,000 Hz) to obtain full benefit of advancement in available telecommunications bandwidth, predominantly for internet. </em></p><p><strong><em>Keywords: </em></strong><em>Speech coding,</em><strong> </strong><em>Super-wide bandwidth,</em><em> ABE,</em> <em>Enhanced voice services, Feature Extraction</em></p><p><strong>Cite this Article</strong></p><p>Rathod RN, Holia MS. Bandwidth Extension of Speech Signal Artificially, and Transmission and Coding for Wireless Communication. <em>Journal of Communication </em><em>Engineering & Systems</em>. 2019; 9(2):<br /> 111–116p.<strong></strong></p><p><em><br /></em></p><p> </p>2019-08-05T07:22:23+00:00Copyright (c) 2019 Journal of Communication Engineering & Systemshttps://computerjournals.stmjournals.in/index.php/JoCES/article/view/419Remote Village Electrification Through Renewable Solar Energy2021-08-04T11:52:12+00:00Ajay Daiyaaadaiya@bvmengineering.ac.inPratiksha Jadejaaadaiya@bvmengineering.ac.inSahindra Patelaadaiya@bvmengineering.ac.inKinjal Solankiaadaiya@bvmengineering.ac.in<p align="center"><strong><em>Abstract</em></strong></p><p>Cost of electricity increasing every year by 15-20% . More than 300 million people in India don’t have electricity access due to lack of infrastructure and Geographical condition. Our country is facing shortage of coal and conventional sources of energy is going to by 2025. Sun is non ending source of green clean & independent energy that can be availed for very long time with minimum expense.</p><p>The cost of generating electricity through solar energy will come down in a year or two. For solar power, the <em>levelized cost</em> of electricity was 11.79% more than coal in 2015. Fossil fuels will become progressively more expensive, primarily due to inflation and increased transportation costs on the other hand solar power is expected to become cheaper. As a result, solar power is expected to be cheaper than imported coal-based power by 2020.</p><p>Our main objective of the projects is to fulfill power requirements of remote areas and utilize our system even in urban areas where conventional sources of energy is utilized for producing electricity during power cut. </p><p><strong>Keywords:</strong><strong> </strong>levelized cost, solar energy, PWM</p><p><strong>Cite this Article</strong></p><p>Ajay Daiya, Pratiksha Jadeja, Sahindra Patel, Kinjal Solanki<em>.</em> Remote Village Electrification through Renewable Solar Energy. <em>Journal of Communication Engineering & Systems</em>. 2019; 9(2): 60–63p. <strong></strong></p>2019-07-31T05:16:49+00:00Copyright (c) 2019 Journal of Communication Engineering & Systemshttps://computerjournals.stmjournals.in/index.php/JoCES/article/view/417DIGITAL PUC CHECKER-Carbon detection system using Arduino and GSM module2021-08-04T11:52:12+00:00Rajvirsinh C. Ranarajvirsinh.rana@bvmengineering.ac.inSalman I Arabirajvirsinh.rana@bvmengineering.ac.inPalak Patelrajvirsinh.rana@bvmengineering.ac.in<p align="center"><strong>Abstract</strong></p><p class="Abstract">The main aim of this paper is to control the emission of pollutant. Our system will work for monitoring the system pollutant using sensor to know the correct level of pollutant and can do the correct measure to reduce the production of pollutant from vehicle.</p><p class="keywords"><strong>Keywords:</strong> carbon monoxide, detection, arduino, GSM module</p><p><strong>Cite this Article</strong></p><p>Rana Rajvirsinh C, Arabi Salman I, Palak Patel. Digital PUC Checker: Carbon Detection System Using Arduino and GSM Module. <em>Journal of Communication Engineering & Systems</em>. 2019; 9(2): 50–55p. <strong></strong></p>2019-07-30T08:40:20+00:00Copyright (c) 2019 Journal of Communication Engineering & Systemshttps://computerjournals.stmjournals.in/index.php/JoCES/article/view/416RFID Based Automatic Billing Trolley2021-08-04T11:52:12+00:00Rajvirsinh Ranarajvirsinh226@yahoo.co.inPrashant Devanirajvirsinh226@yahoo.co.inSarju Dadhaniyarajvirsinh226@yahoo.co.inRipal Patelrajvirsinh226@yahoo.co.in<p align="center"><strong>Abstract</strong> </p><p>Nowadays shopping at the mall is becoming a cumbersome process as after purchasing the items one needs to go to the billing counter & there each item is scanned individually through barcode stickers. By using RFID system we can overcome this problem. Each item is equipped with RFID tags and a RFID reader is used to detect the codes on the item and the price of the item is saved into the memory and finally the total bill will be displayed on the LCD screen.</p><p><strong>Keywords</strong><strong>: </strong>MFRC522, RFID Tag, Arduino UNO</p><p><strong>Cite this Article</strong></p><p>Rajvirsinh Rana, Prashant Devani, Sarju Dadhaniya, Ripal Patel<em>. </em>RFID Based Automatic Billing Trolley. <em>Journal of Communication Engineering & Systems</em>. 2019; 9(2): 56–59p.<strong></strong></p><p><em><br /></em></p>2019-07-30T08:35:18+00:00Copyright (c) 2019 Journal of Communication Engineering & Systemshttps://computerjournals.stmjournals.in/index.php/JoCES/article/view/408An Overview of Classification of Signal and System2021-08-04T11:52:12+00:00P. M. Mankarpallavimankar11@gmail.comN. N. Sawadenikitaswd1@gmail.com<p class="Abstract" align="center"><strong><em>Abstract</em></strong><em></em></p><p><em>Signals and systems are abstract concepts of a wide variety of physical variables and processes in various fields in engineering and sciences. This paper presents the basic idea of signal and system along with their classification. In the real world, any quantity reveal<ins cite="mailto:Krishna%20Kumar%20Jaiswal" datetime="2019-06-02T00:37">s</ins> variation in time or variation in space or any other independent variable is potentially a signal. This paper includes <span style="color: #008000;">a </span>theoretical view with some supportive equation in continuous and discrete<ins cite="mailto:Krishna%20Kumar%20Jaiswal" datetime="2019-06-04T10:09">.</ins></em></p><p class="Keywords"><strong>Keywords:</strong> Continuous, discrete, signal, system</p><p><strong>Cite this Article</strong></p><p>P. M. Mankar, N. N. Sawade. An Overview of Classification of Signal and System. <em>Journal of Communication Engineering & Systems</em>. 2019; 9(2): 46–49p.<strong></strong></p>2019-07-19T07:25:24+00:00Copyright (c) 2019 Journal of Communication Engineering & Systemshttps://computerjournals.stmjournals.in/index.php/JoCES/article/view/243Optimize Throughput by Estimating Optimal Packet Length for Wireless Sensor Node2021-08-04T11:52:12+00:00Hiren Patelhiren139@gmail.comVipul Shahhiren139@gmail.com<p align="center"><strong><em>Abstract</em></strong></p><p><em>A Wireless Sensor Network (WSN) is employed for monitoring and control of distributed sensing points with the use of Sensor Nodes (SN). The sensor nodes form a wireless network to disseminate the sensed data over to the base station for its processing and analysis. For a wireless network, effective and efficient communication of data from the sensor node to base station plays a vital role in estimating the life of the network as a whole. The interferences and disturbance in the environment degrade the channel performance resulting in increased communication cost. In this paper, we propose a method to estimate the optimal Payload length considering the probability of error for the given scenario. For estimating optimal data-length in packet improves throughput and conserves communication by reducing retransmissions due to packet errors. Two techniques for 1D Optimization, Golden Section Search and Fibonacci Search Algorithm, are used and compared for Payload-length optimization with traditional exhaustive search method.</em></p><p><strong><em>Keywords: </em></strong><em>Fibonacci search algorithm, golden section search, iterative search methods, optimization, packet length, payload length</em></p><p><strong>Cite this Article</strong></p><p>Hiren Patel, Vipul Shah. Optimize Throughput by Estimating Optimal Packet Length for Wireless Sensor Node. <em>Journal of Communication Engineering & Systems</em>. 2019; 9(2): 37–45p.<strong></strong></p><p><em><br /></em></p>2019-07-19T07:10:14+00:00Copyright (c) 2019 Journal of Communication Engineering & Systemshttps://computerjournals.stmjournals.in/index.php/JoCES/article/view/407Salp Swarm Algorithm Optimized Tilt Integral Derivative Controller for Controlling the Frequency of Load in Multi Area Multi Source Power System With and Without Electric Vehicle2021-08-04T11:52:12+00:00Deeksha .deekshasingh1591@gmail.comAmit Kumardeekshasingh1591@gmail.com<p class="Abstract"><strong><em>Abstract- </em></strong>In this paper, Salp Swarm Algorithm (SSA) is used to tune the parameters of tilt integral derivative (TID) controller to control the frequency of load in multi area interconnected multi source system in the presence of electric vehicle (EV). In the proposed system there are two areas and each area consist of three sources i.e. gas unit, hydro unit and reheat thermal unit . In order to exhibit the superiority of SSA, it is compared with number of other algorithms like, Local Unimodal Sampling (LUS), differential evolution (DE), Teaching learning based optimization (TLBO), all tuning the parameters of PID controller in the same system without EV. Further in the same system different type of controllers like I, PI, PID and TID tuned with the help of SSA are compared and the superiority of TID controller is demonstrated. Finally it can be seen that SSA optimized TID controller exhibit superior performance in the presence of electric vehicle as compared to in the absence of electric vehicle in terms of settling time and maximum undershoot in frequency and tie-line power deviation.</p><p class="keywords"><strong>Keywords—</strong> TID controller, electric vehicle, load frequency control, SSA</p><p><strong>Cite this Article</strong></p><p>Deeksha, Amit Kumar. Salp Swarm Algorithm Optimized Tilt Integral Derivative Controller for Controlling the Frequency of Load in Multi-Area Multi-Source Power System with and without Electric Vehicle. <em>Journal of Communication Engineering & Systems</em>. 2019; 9(2): 25–36p.<strong></strong></p>2019-07-18T11:42:03+00:00Copyright (c) 2019 Journal of Communication Engineering & Systemshttps://computerjournals.stmjournals.in/index.php/JoCES/article/view/92Analysis of FSO Communication System under different weather conditions by incorporating Pre and Post Optical Amplifier2021-08-04T11:52:12+00:00Pardeep Kumarphougatpardeep@gmail.comPoonam Singhalphougatpardeep@gmail.com<p align="center"><strong><em>Abstract</em></strong></p><p><em>FSO Communication is currently needed for the modern era because of high channel capacity and bandwidth. FSO is a line of sight; license free and low-cost technology which makes it preferred over radio frequency communication and other wireless technologies. In this paper, the first part tells about the introduction of the FSO system, its advantages, disadvantages and applications. The second part will discuss the atmospheric attenuation caused by different weather conditions, i.e. rain, snow, fog, etc. The third part of this paper informs about the proposed design of the FSO system. We have designed two 10 Gbps FSO systems by employing optical amplifiers and presented an analysis of the proposed FSO systems with different weather conditions from a distance of 9 Km.</em> </p><p><strong><em>Keywords: </em></strong><em>Attenuation, BIR, FSO, Q-factor</em></p><p><strong>Cite this Article</strong></p><p>Pardeep Kumar, Poonam Singhal.<em> </em>Analysis of FSO Communication System under Different Weather Conditions by Incorporating Pre and Post Optical Amplifier.<em> Journal of Communication Engineering & Systems</em>. 2019; 9(2): 16–24p.<strong></strong></p><p><em><br /></em></p>2019-07-18T11:13:00+00:00Copyright (c) 2019 Journal of Communication Engineering & Systemshttps://computerjournals.stmjournals.in/index.php/JoCES/article/view/380A quad band PIFA for 4G / 5G wireless communication applications2021-08-04T11:52:12+00:00Amrit Kaurds.amrit@gmail.comBikrampal Kaurds.amrit@gmail.comRuchi Pasrichads.amrit@gmail.comAnjali .ds.amrit@gmail.com<p><strong>Abstract<em></em></strong></p><p><em>A compact PIFA for wireless RF (Radio Frequency) devices is presented. The proposed antenna covers GPS L1, GSM 1800, GSM 1900, UMTS 2100, LTE 1700/2100 MHz, LTE 2300, Bluetooth/Wi-Fi/IEEE 802.11 b/g/n, RFID, IEEE 802.16e mobile WiMAX, UNII and C-band frequency bands useful for both 4G and 5G wireless communication applications. The simulation results for return loss, VSWR, two-dimensional radiation patterns and current distribution are demonstrated. The parametric analysis of feed position in the top patch is also shown and its effects on S11 are examined. The fabricated PIFA results are measured using VNA. The obtained return loss values are less than -10 dB and VSWR values are less than 2.</em></p><p><strong><em>Keywords: </em></strong><em>PIFA, return loss, 4G, 5G</em></p><p><strong>Cite this Article</strong></p><p>Amrit Kaur, Bikrampal Kaur, Ruchi Pasricha, Anjali. A Quad-Band PIFA for 4G/5G Wireless Communication Applications. <em>Journal of Communication Engineering & Systems</em>. 2019; 9(2): 7–15p.<strong></strong></p><p><em><br /></em></p>2019-07-18T11:05:59+00:00Copyright (c) 2019 Journal of Communication Engineering & Systemshttps://computerjournals.stmjournals.in/index.php/JoCES/article/view/395Cost-Effective Smart Home Automation using Internet of Things2021-08-04T11:52:12+00:00Ankita Guptaankitagupta1331@gmail.comAnkit Srivastavaankitsrivas14@gmail.comRohit Anandroh_anand@rediffmail.com<p class="Normal1" align="center"><strong><em>Abstract</em></strong></p><p class="Normal1"><em>A smart home is a concept of connected inside and outside home services using a network with the help of smart devices. These smart devices can share information enabling proper control and management over the home through network integrations. Portable Internet of Things (IoT) Board is a system that uses smartphones for controlling essential home functions and features of the internet from anywhere around the world remotely. This paper suggests an IOT based home automation project module that serves as a boon in the upcoming future for humankind by decreasing the cost required for a smart home drastically. Furthermore, the idea discussed here is expected to act as a perfect remedy to reduce power loss, to increase efficiency and to improve the user experience at a minimal rate. IoT based smart home module is a step which strives to take humanity forward to a platform that is more user-friendly.</em><strong><em> </em></strong></p><p class="Normal1"><strong><em>Keywords: </em></strong><em>Arduino, ESP8266, Internet of Things (IoT), Smart Home Automation, Wi-Fi Module</em></p><p><strong>Cite this Article</strong></p><p>Ankita Gupta, Ankit Srivastava, Rohit Anand. Cost-Effective Smart Home Automation using the Internet of Things. <em>Journal of Communication Engineering & Systems</em>. 2019; 9(2): 1–6p.<strong></strong></p><p class="Normal1"><em><br /></em></p>2019-07-18T10:44:19+00:00Copyright (c) 2019 Journal of Communication Engineering & Systemshttps://computerjournals.stmjournals.in/index.php/JoCES/article/view/441Analysis of M-MRC Receiver over Nakagami-m Fading Channels using Wireless Information and Power Transfer System2021-08-04T11:29:54+00:00Nandita Dekanandeka89@gmail.comRupaban Subadarnandeka89@gmail.com<p><strong>Abstract</strong></p><p><em>The expression for the performance of Outage probability and Average bit-error rate (ABER), have been presented in this paper, considering an arbitrary branch Maximal Ratio Combining (MRC) Receiver, over Nakagami-m Fading Channels using simultaneous wireless information and power transfer (SWIPT). For the SWIPT system, a Power splitter (PS) at the receiver side has been employed, which splits the received signal into the information transmitter and the energy harvesting parts. A probability density function (PDF) based approach has been used to derive the outage probability and Average Bit Error Rate for binary coherent and noncoherent modulation schemes of the system. The obtained results are matched perfectly with the Monte-Carlo simulation results.</em></p><p><strong>Keywords:</strong> Nakagami-m fading, Energy harvesting, MRC, Power Splitter, SWIPT, Outage probability, ABER</p><p class="keywords"><strong>Cite this Article</strong></p><p>Nandita Deka, Rupaban Subadar. Analysis of M-MRC Receiver over Nakagami-m Fading Channels using Wireless Information and Power Transfer System. <em>Journal of Communication Engineering & Systems</em>. 2019; 9(1): 49–54p.<strong></strong></p>2019-06-24T08:16:19+00:00Copyright (c) 2019 Journal of Communication Engineering & Systemshttps://computerjournals.stmjournals.in/index.php/JoCES/article/view/440ABER of Transmit Antenna Selection with Maximal Ratio Combinining-MIMO System over Nakagami-m Fading Channels2021-08-04T11:29:54+00:00Rajkishur Mudoirajkishur@gmail.comHubha Saikiarajkishur@gmail.comRupaban Subadarrajkishur@gmail.com<p class="Abstract" align="center"><strong>Abstract</strong><em></em></p><p class="Abstract">This paper presents the average bit error rate (ABER) of a multiuser, multiple input and multiple output (MIMO) wireless system. Transmit antenna selection at the base station and maximal ratio combining at the receiver is considered for downlink transmission. For coherent and noncoherent modulation schemes, ABER performance of the system is analyzed. The closed form expressions have been derived for ABER considering Nakagami-m fading channels. The effects of fading parameter and selection gain on the ABER of the system have been observed. The results are validated by the computer simulation.<em> </em></p><p class="Abstract"><strong>Keywords:</strong> ABER, Multiple input multiple output (MIMO), Transmit antenna selection and maximal ratio combining (TAS/MRC), Nakagami-m fading</p><p class="papertitle"><strong>Cite this Article</strong></p><p class="papertitle">Rajkishur Mudoi, Hubha Saikia, Rupaban Subadar. ABER of Transmit Antenna Selection with Maximal Ratio Combinining-MIMO System over Nakagami-m Fading Channels. <em>Journal of Communication Engineering & Systems</em>. 2019; 9(1): 43–48p.</p>2019-06-24T07:10:37+00:00Copyright (c) 2019 Journal of Communication Engineering & Systemshttps://computerjournals.stmjournals.in/index.php/JoCES/article/view/439Performance Analysis of Ultra-Short Junctionless DGMOS Nanowire Transistors with High-k Gate Dielectric2021-08-04T11:29:54+00:00N. Boranipankabora@gmail.comR. Subadarnipankabora@gmail.com<p align="center"><strong><em>Abstract</em></strong></p><p><em>In this report, we present a comparative analysis of ultrashort 3-D junctionless nanowire DGMOS transistors using different high-k gate dielectric by virtually fabricating the device in Visual TCAD. </em><em>The ultrashort devices having channel length of 20 nm were simulated and performances like I-V characteristics, transconductance etc. were analysed. It was found that HfO<sub>2</sub> has better steady state performances as gate dielectric owing to better control of the channel over the SiO<sub>2</sub> and Si<sub>3</sub>N<sub>4</sub>. </em></p><p><strong><em>Keywords: </em></strong><em>Junctionless DGMOS nanowire transistors; High-k gate dielectric; </em><em>3-D </em><em>virtual fabrication</em></p><p><strong>Cite this Article</strong></p><p><em>N. Bora, R. Subadar. Performance Analysis of Ultra-Short Junctionless DGMOS Nanowire Transistors with High-k Gate Dielectric. Journal of Communication Engineering & Systems</em>. 2019; 9(1): 35–42p.</p><p><em><br /></em></p>2019-06-24T06:57:06+00:00Copyright (c) 2019 Journal of Communication Engineering & Systemshttps://computerjournals.stmjournals.in/index.php/JoCES/article/view/237A Survey on Recent Microstrip Patch Antenna for Navigational Application2021-08-04T11:29:54+00:00Shahid Salauddin Modasiyashahid@gecg28.ac.inJagdish M Rathodjmr.bvm@gmail.com<p class="Author"><strong>ABSTRACT</strong></p><p class="Author">Since last so many years microstrip patch antenna is one of the important fields for antenna design<strong>.</strong> For a different application of satellite communication in which prize, structure simple installation process is one of the key requirement low profile antenna is good to consider<strong>.</strong> Microstrip antennas is also fulfill the requirements of mobile communication as well as wireless communication. For navigational application the few important parameters are there like compact size, bandwidth, circular polarization etc. Many different techniques are used to achieve above parameters with acceptance level results, here we have explained some techniques especially for GNSS application and give comparative analysis among all mention method.</p><p><strong>Keywords—</strong>GNSS, Microstrip Patch Antenna, Circular Polarization</p>2019-05-23T08:43:34+00:00Copyright (c) 2019 Journal of Communication Engineering & Systemshttps://computerjournals.stmjournals.in/index.php/JoCES/article/view/404Recent Advancements of Internet of Things in Electric Power Industry2021-08-04T11:29:54+00:00Vishal Jainvishal_dehradun@yahoo.comSaloni .vishal_dehradun@yahoo.com<p align="center"><strong><em>Abstract</em></strong></p><p><em>Electric power industry is undergoing a revolution to supply clean distributed energy for sustainable growth. Internet of Things (IoT) is playing a vital role in the development of power sector, which includes smart metering, intelligent control, real time monitoring and security. In addition, the use of IoT enables significant improvement in power management and energy depletion. The use of IoT ensures trivial growth and development opportunities in the electric power industry. The recent progress in the field of computational intelligence and communication technologies can develop an intelligent IoT system for electric power sector. This study provides a review on the recent challenges of IoT in building an efficient and dependable power system.</em></p><p><strong><em>Keywords</em></strong><em>:<strong> </strong>Smart grid, SCADA, actuators, control, optimization</em></p><p><em><strong>Cite this Article</strong></em></p><p><em>Vishal Jain, Saloni. Recent Advancements of Internet of Things in Electric Power Industry. Journal of Communication Engineering & Systems. 2019; 9(1): 30–34p.</em> <strong></strong></p><p><em><br /></em></p>2019-05-18T06:53:58+00:00Copyright (c) 2019 Journal of Communication Engineering & Systemshttps://computerjournals.stmjournals.in/index.php/JoCES/article/view/209Communication at High Data Rate with VCSEL Over MMF and Investigations2021-08-04T11:29:54+00:00Dr. Devendra Kumar Tripathidekt@rediffmail.com<p align="center"><strong><em>Abstract</em></strong></p><p><em>This paper presents performance evaluation for the high data rate proposed communication network with VCSEL and multi-mode optical fiber. Numerous numerical evaluations have been carried out for key parameters over the span of multi-mode fiber. It showed wide eye opening over the selected length of fiber. It depicted good performance for line width of 10, lower normalizer average power, with temperature value of 40 degree centigrade. Overall performance over 2km of MMF is good however dropping in Q factor and BER has been observed with hike in data rates. Investigation depicted proposed design could be an assistance for the short haul communication at higher data rates providing essential bandwidth at low expenses.</em></p><p><strong><em>Keywords:</em></strong><em> local area networks (LANs), multi mode fiber (MMF), optical interlink (OI), vertical cavity surface emitting laser (VCSEL)</em></p><p><em><strong>Cite this Article</strong></em></p><p><em>Devendra Kr. Tripathi. Communication at high data rate with VCSEL over MMF and Investigations. Journal of Communication Engineering & Systems. 2019; 9(1): 14–21p. <strong></strong></em></p><p><em><br /></em></p>2019-05-18T06:42:12+00:00Copyright (c) 2019 Journal of Communication Engineering & Systemshttps://computerjournals.stmjournals.in/index.php/JoCES/article/view/244Clustering based Model to Provide Defense against DDoS attacks in MANETs2021-08-04T11:29:54+00:00Deepa Nehradeepa.nehra@gmail.comKanwalvir Singh Dhindsakdhindsa@gmail.comBharat Bhushanbharat_dhiman@hotmail.com<p align="center"><strong><em>Abstract</em></strong></p><p><em>Security of MANETs is the part of extensive issue of research in past years. MANET is liable to DDoS attacks because of its no fixed infrastructure, changing topology, open medium, cooperative and trust-based algorithms and absence of a well-defined line of defense. DDoS attack is a synchronized attack created by attackers to overflow the target network with big quantity of information in the form of packets such that the resources of the target network are exhausted leading to the deterioration of the network performance. Most of the solutions to defend these attacks are meant for the wired network and not applicable to MANETs. In this proposal, we are going to discuss the resulting effects of these attacks on MANETs and try to defend them at the early stages. For this global defense scheme, we are using the concept of clustering in MANETs. The defense components are deployed on mobile nodes of clusters, which cooperate with each other and protect MANETs from DDoS attacks.</em></p><p><strong><em>Keywords: </em></strong><em>MANETs, DDoS attacks, security, clustering</em></p><p><em><strong>Cite this Article</strong></em></p><p><em>Deepa, Kanwalvir Singh Dhindsa, Bharat Bhushan. Clustering based Model to Provide Defense against DDoS attacks in MANETs. Journal of Communication Engineering & Systems. 2019; 9(1): 7–13p.</em><strong></strong></p><p><em><br /></em></p><p> </p>2019-05-18T06:34:51+00:00Copyright (c) 2019 Journal of Communication Engineering & Systemshttps://computerjournals.stmjournals.in/index.php/JoCES/article/view/252A Suite of Security Mechanisms for Security and Privacy in MANET2021-08-04T11:29:54+00:00Mukesh Singlamukesh27singla@yahoo.co.in<p align="center"><strong><em>Abstract</em></strong></p><p><em>Reputation of mobile strategies and wireless networks has significantly increased; wireless mobile networks have become popular and vigorous fields of message and link ages from many the years. MANET is the novel advance invention which allows clients to connect without any bodily infrastructure, irrespective of their location, that is why it is quantified as an “infrastructure-less” network. In the past few years, we have seen huge amount of wireless infrastructures technologies. Wireless skills are usually used today across the globe to support the communication needs of very huge numbers of end users. Simulation of black hole and gray hole attack implemented in network simulator (ns2) show that the performance of AODV is severely exaggerated due to presence of black hole and gray hole attacks in wireless ad-hoc environment. The security schemes such as Watchdog AODV govern trust among communicating entities are together known as trust management. Here we evaluate the outcome of numerous black hole and gray hole attacker nodes on the performance of whole network and compared two potential trust management and cryptography grounded resolution that attempt to eradicate the black hole and gray hole through watching arrangement to separate malicious nodes from the network. We can conclude that Watchdog AODV trust management solution for preventing black hole attack is much improved than the other proposed IDS AODV solution and IDS-AODV solution for gray hole attacker nodes is much improved than other WATCHDOG AODV scheme.</em></p><p><strong><em>Keywords:</em></strong><em> Packet delivery ratio, intrusion detection system, mobile ad hoc network, wireless sensor network, ad hoc on-demand distance vector</em></p><p><strong>Cite this Article</strong></p><p>Mukesh Singla. A Suite of Security Mechanisms for Security and Privacy in MANET. <em>Journal of Communication Engineering & Systems</em>. 2019; 9(1): 1–6p.<strong></strong></p><p><em><br /></em></p>2019-05-18T06:19:15+00:00Copyright (c) 2019 Journal of Communication Engineering & Systemshttps://computerjournals.stmjournals.in/index.php/JoCES/article/view/400Improvising on Demand Protocol to Improved Energy Utilization in Wireless Sensor Network2021-08-04T11:29:54+00:00Neha Mittalneha.mittal@chitkarauniversity.edu.inNirmaljeet Kaurneha.mittal@chitkarauniversity.edu.inManik Guptaneha.mittal@chitkarauniversity.edu.inChetan Sharmaneha.mittal@chitkarauniversity.edu.in<p align="center"><strong><em>Abstract</em></strong><strong><em></em></strong></p><p><em>In the 21st century, the advancement in technology is the wireless networks. In wireless networks, intelligent sensors are deployed in a physical area called as WSN (Wireless Sensor Network). All the sensor nodes are attached to a network and batteries are needed to provide energy to the nodes. Batteries may be in charged or discharged mode. During communication of all the sensor nodes, lot of energy is consumed. The main aim is to increase the lifetime of the sensor node. In this study, we propose some configuration changes in on-demand protocol to increase the node lifetime and reduce energy consumption under the parameters of upload and download response time. The simulation is done in OPNET under various scenarios. The experimental results and graphs proved that the proposed work improves the energy efficiency of the sensor node.</em></p><p><strong><em>Keywords: </em></strong><em>Wireless sensor network, routing protocol, response time</em></p><p><strong>Cite this Article</strong></p><p>Neha Mittal, Nirmaljeet Kaur, Manik Gupta, Chetan Sharma. Improvising on Demand Protocol to Improved Energy Utilization in Wireless Sensor Network. <em>Journal of Communication Engineering & Systems</em>. 2019; 9(1): 22–29p. <strong></strong></p><p><em><br /></em></p>2019-05-16T05:02:25+00:00Copyright (c) 2019 Journal of Communication Engineering & Systemshttps://computerjournals.stmjournals.in/index.php/JoCES/article/view/398Comparative Study of LEACH and its Optimized Variants in Wireless Sensor Networks2021-08-04T11:29:54+00:00Jatinder Pal Singhsachdeva.jp@gmail.comAnuj K. Guptasachdeva.jp@gmail.comAnil K. Vermasachdeva.jp@gmail.com<p align="center"><strong><em>Abstract</em></strong></p><p><em>To capture sensed data from different locations, Wireless sensor network (WSN) requires large number of sensors in the monitoring area. A sensor helps in sensing and forwarding data to an application data store but due to inadequate energy, preserving the network lifetime and its operation remains a major challenge in WSN. To overcome this challenge different clustering techniques are proposed in literature. LEACH is a primitive clustering technique from which most of the latest clustering techniques stem in. Many recent studies have focused on the optimization of cluster based WSNs through fine tuning of LEACH parameters and other related parameters. Motivated by this, we reviewed the latest optimized variants of LEACH in this paper. This survey will provide a roadmap for future researchers to scrutinize LEACH and its variants in terms of optimization technique used and parameters used for clustering.</em><em></em></p><p><strong><em>Keywords: </em></strong><em>Wireless sensor network (WSN), Sensor Node(SN), Base Station(BS), Cluster Head (CH)</em></p><p><strong>Cite this Article</strong></p><p>Jatinder Pal Singh, Anuj K. Gupta, Anil K. Verma. Comparative Study of LEACH and its Optimized Variants in Wireless Sensor Networks. <em>Journal of Communication Engineering & Systems</em>. 2019; 9(1): 60–69p.</p><p><em><br /></em></p>2019-05-15T06:31:57+00:00Copyright (c) 2019 Journal of Communication Engineering & Systemshttps://computerjournals.stmjournals.in/index.php/JoCES/article/view/356Terrorist Network Mining2020-05-16T08:23:57+00:00Poorva Singhaniasinghaniapoorva7@gmail.comAkhilesh Tiwarisinghaniapoorva7@gmail.com<p align="center"><strong><em>Abstract</em></strong><em></em></p><p><em>Terrorist activities worldwide has moved toward the advancement of different high-finished strategies for dissecting psychological militant gatherings and disrupting government systems. Existing examination found that social network analysis (SNA) is a standout amongst the best and persistent technique for countering fear mongering in interpersonal organizations. In this paper our approach is divided in two phases, in Phase 1, we apply shuffled frog leap algorithm (SFLA) for SNA in order to identify potential terrorist node by analyzing twitter real time data analysis and in phase 2 we use the output of phase 1 as input and generate influence of one node in all the others (n-1) node in node n network by applying node influencing metrics. The advantage of using node influencing metrics comparison to other centrality measures for node influence is that, it is independent of network topology. It can upgrade the capacity of SNA for giving element conduct of online interpersonal organizations. This paper plots an assortment of measures and systems utilized as a part of SNA for counter-psychological oppression exercises. </em></p><p><strong><em>Keywords</em></strong><strong><em>:</em></strong><em> Social network analysis, terrorist networks, shuffled frog leap algorithm and node influencing metric</em></p><p><strong>Cite this Article</strong><strong></strong></p><p>Poorva Singhania, Akhilesh Tiwari. Terrorist Network Mining. <em>Journal of Communication Engineering & Systems</em>. 2017; 7(2): 42–52p.</p><p><em><br /></em></p>2019-04-06T05:00:06+00:00Copyright (c) 2019 Journal of Communication Engineering & Systemshttps://computerjournals.stmjournals.in/index.php/JoCES/article/view/355A New Framework for Optimal Hesitation Pattern Mining2020-05-16T08:23:41+00:00Aditi Jainaditi66jain@gmail.comAkhilesh Tiwariaditi66jain@gmail.com<p align="center"><strong><em>Abstract</em></strong></p><p><em>In mathematical optimization, the firefly algorithm is a metaheuristic approach. It has been proposed by Xin-She Yang and inspired by the flashing behavior of fireflies. Proposed research used Firefly Algorithm for discovering the best Association rules. In this species, it is always the female who glows, and only the male has wings. In other species, Luciola lusitanica, both male and female firefly may emit light and both have wings. If a firefly is hungry or looks for a mate its light glows brighter in order to make the attraction of insects or mates more effective. Since the stored data are not always exact and precise, some means are required to handle this aspect of data and extract the useful information, (e.g., hesitation information) arising from such uncertainties. For this purpose vague set theory using Firefly Algorithm emerge as powerful tool will be applied to optimize the Association rule for efficiently modeling the uncertainties that occur in datasets. A new efficient approach is proposed for exploring high-quality association rules. The proposed approach is based on firefly algorithm, which is an optimization algorithm used in extracting Vague or Hesitant Information. In this approach, we initialize the population of firefly. Calculate the fitness of each firefly. If fitness of firefly (j) is greater than firefly (i) than firefly (i) move toward firefly (j). Calculate the intensity of firefly (i) and update light intensity of firefly (i). This iteration continues till maximum or desired condition occurs.</em></p><p><strong><em>Keywords: </em></strong><em>Hesitant Mining, Optimization technique, Association rule, Vague association rule, firefly algorithm</em></p><p class="Articletitle"><strong>Cite this Article</strong></p><p class="Articletitle">Aditi Jain, Akhilesh Tiwari. A New Framework for Optimal Hesitation Pattern Mining. <em>Journal of Communication Engineering & Systems. </em>2017; 7(2): 34–41p.</p><p><em><br /></em></p>2019-04-06T04:46:31+00:00Copyright (c) 2019 Journal of Communication Engineering & Systemshttps://computerjournals.stmjournals.in/index.php/JoCES/article/view/354A CPW Feed Compact UWB Antenna with Five Band Notches2020-05-16T08:23:27+00:00Ajeet Pratap Singhajeetpg@gmail.comR. Khannaajeetpg@gmail.comHardeep Singhajeetpg@gmail.com<p align="center"><strong><em>Abstract</em></strong></p><p><em>A novel small CPW feed UWB antenna with five notch bands is projected to suppress the potential interferences in ultra-wideband systems. </em><em>This projected antenna has a small dimension of </em><em>30x32x1.6 mm<sup>3 </sup>and</em><em> </em><em>an operating bandwidth (VSWR<2) from </em><em>2.8 to 11.6 GHz</em><em>. By introducing five U-shaped slots, five notches are achieved in WiMAX (3.1–4 GHz), WLAN (5–5.4 GHz and 5.7–5.9 GHz), X-band downlink (7.2–7.75 GHz), and ITU service band (8–8.4 GHz). The antenna is fabricated and simulated. Measured results show a good harmony with simulated results. In addition, the projected antenna has omnidirectional radiation patterns </em><em>except for notch bands; make it suitable for UWB applications.</em></p><p><strong><em>Keywords:</em></strong><em> UWB, notch band, WiMAX, WLAN,</em><em> X-band,</em><em> ITU</em></p>2019-04-06T04:37:59+00:00Copyright (c) 2019 Journal of Communication Engineering & Systemshttps://computerjournals.stmjournals.in/index.php/JoCES/article/view/353Deployment of Fi-Wi Networks Using Teaching Learning Based Optimization Algorithm2020-05-16T08:23:15+00:00Uma Rathore Bhattumarathore@rediffmail.comNitin Chouhanumarathore@rediffmail.comRaksha Upadhyayumarathore@rediffmail.comChanchal Agrawalumarathore@rediffmail.com<p align="center"><strong><em>Abstract</em></strong></p><p><em>The demand of bandwidth and mobility to end users is ever increasing. For fulfilling this, fiber-wireless (Fi-Wi) networks are designed by integrating the advantages of optical and wireless networks. Optical networks offer high bandwidth and stability while wireless networks offer cost efficiency and mobility. With these advantages, Fi-Wi networks also offer some challenging issues. There are four key issues in Fi-Wi networks, that are ONU placement, routing, energy saving and survivability. Amongst them, ONU placement is one of the important issues, since ONU is interlink between the fiber technology and wireless technology. ONU transfers the upstream data from wireless to optical line terminal (OLT) and the downstream data from OLT to wireless routers. Lesser the number of ONUs in the network, more is the cost efficiency in that network. For the placement of ONUs, various optimization algorithms are designed and applied. In this paper, an efficient algorithm based on ‘Teaching–Learning-Based Optimization (TLBO)’ is proposed for optimized placement of ONUs in Fi-Wi networks. The effectiveness of the method as compared to the other optimization methods is also explained. The proposed method is algorithm-specific parameter less method. Hence, different design variables do not affect the working of this method. It also results into reduced number of ONUs in Fi-Wi network.</em></p><p><strong><em>Keywords: </em></strong><em>FiWi network, optical network unit (ONU), wireless router (WR), </em><em>teaching-learning-based optimization (TLBO)</em></p><p class="author"><strong>Cite this Article</strong><strong></strong></p><p>Uma Rathore Bhatt, Nitin Chouhan, Raksha Upadhyay <em>et al.</em> Deployment of Fi-Wi Networks Using Teaching Learning Based Optimization Algorithm. <em>Journal of Communication Engineering & Systems.</em> 2017; 7(2): 14–26p.</p><p><em><br /></em></p>2019-04-05T10:58:34+00:00Copyright (c) 2019 Journal of Communication Engineering & Systemshttps://computerjournals.stmjournals.in/index.php/JoCES/article/view/352An Energy Efficient Routing Algorithm for FiWi Access Network2020-05-16T08:23:04+00:00Raksha Upadhyayumarathore@rediffmail.comUma Rathore Bhattumarathore@rediffmail.com<p align="center"><strong><em>Abstract</em></strong></p><p><em>Fiber wireless access network is a promising access network due to the provision of higher bandwidth, flexibility, and ubiquity. One of the main challenges for a FiWi access network is to minimize energy consumption. In this network, there are many concerns like ONU placement, ONU sleep mechanisms, power saving mechanisms, etc., which are accountable for achieving energy efficiency. Routing is another aspect at the front end of the network, which may contribute to bringing energy efficiency. There are multiple paths from source to destination at the front end; therefore the selection of appropriate and energy efficient path is indispensable. This paper proposes an integrated routing algorithm, which finds the routes on the basis of distance and angle, for a single source-destination pair. The route which consumes lesser energy is selected for communication. Results show that energy consumption is reduced using the proposed algorithm as compared to existing approaches while maintaining limited delay.</em></p><p><strong><em>Keywords: </em></strong><em>FiWi access network, PON, WLAN, front end, ONU, energy efficiency, routing, path discovery, multi-hop, delay</em></p><p><strong>Cite this Article</strong><strong></strong></p><p>Raksha Upadhyay, Uma Rathore Bhatt. An Energy Efficient Routing Algorithm for FiWi Access Network. <em>Journal of Communication Engineering & Systems.</em> 2017; 7(2): 1–13p.</p><p><em><br /></em></p>2019-04-05T10:28:38+00:00Copyright (c) 2019 Journal of Communication Engineering & Systemshttps://computerjournals.stmjournals.in/index.php/JoCES/article/view/351Black Hole Attack in MANET2020-05-16T08:20:37+00:00Kapil Chaudharykapil.10030@gnindia.dronacharya.infoMd. Khwaza Meharbankapil.10030@gnindia.dronacharya.infoMonu Singhkapil.10030@gnindia.dronacharya.info<p align="center"><strong><em>Abstract</em></strong></p><p><em>Wireless network in today’s era is increasing day by day, with the rising need of wireless connectivity the threat of attack on the Mobile Ad-hoc Network (MANET) is also increasing. MANET Routing protocols suffer from different kind of attacks on all the layers of protocol stack. One of such attack which occurs at network layer is Black Hole Attack [1]. Black hole attack is one of the security issues in MANET, in which the Traffic is redirected to such a node that actually does not exist in the network. This malicious node uses the Routing Protocol to advertise itself as having the shortest path to the node whose packet it want to intercept. Once intercepted malicious node attracts the packet towards it and discards the packet without informing the source that the data didn’t reach to the intended recipient. Previously, work done on the security issues in MANET were based on Reactive Routing Protocols like AODV, DSR etc. Aim of the study is to analyze the effect of black hole attack on Routing protocol and proposing the feasible solution for the same.</em></p><p><strong><em>Keywords: </em></strong><em>MANET, AODV, DSR.</em></p><p><strong>Cite this Article</strong><strong></strong></p><p>Kapil Chaudhary,<strong><em> </em></strong>Md. Khwaza Meharban, Monu Singh. Black Hole Attack in MANET. <em>Journal of Communication Engineering & Systems. </em>2017; 7(1): 29–31p.</p><p><em><br /></em></p>2019-04-05T10:11:31+00:00Copyright (c) 2019 Journal of Communication Engineering & Systemshttps://computerjournals.stmjournals.in/index.php/JoCES/article/view/349Automatic Street Lamp2020-05-16T08:20:16+00:00Pratik S. Sankhesssankhe.chem@gmail.comAnkit S. Sawantsssankhe.chem@gmail.com<p align="center"><strong><em>Abstract</em></strong></p><p><em>In modern era, conservation of energy is very important. It is even vital to reduce human efforts by making systems automatic and it also reduces cost of human labour. Automatic street lamp consists of main components like relay, transformer etc. Conservation of nonrenewable energy (electricity) is need of hour and this motive is being achieved by this projects. Street Light Control System which operates automatically is not only easiest but also the intelligent system. This system can be set to operate in automatic mode, which regulates the streetlight according to brightness and dimness.</em></p><p><strong><em>Keywords: </em></strong><em>Transformer, Relay, LED, LDR, Street lighting systems, Automatic street lamp</em></p><p><strong>Cite this Article</strong></p><p>Pratik S. Sankhe, Ankit S. Sawant. Automatic Street Lamp. <em>Journal of Communication Engineering & Systems</em>. 2017; 7(1): 25–28p.</p><p><em><br /></em></p>2019-04-05T08:37:54+00:00Copyright (c) 2019 Journal of Communication Engineering & Systemshttps://computerjournals.stmjournals.in/index.php/JoCES/article/view/348Improved Performance by Using k-means Clustering in Vehicular Ad Hoc Network2020-05-16T08:19:56+00:00Neha Jaine.nehajain@gmail.comKrishna Kumar Joshie.nehajain@gmail.com<p class="Abstract" align="center"><strong><em>Abstract</em></strong><em></em></p><p class="Abstract"><em>VANETs are formed by applying the principles of MANETs, in which all node, i.e., vehicles can pursue traffic law with high speed. VANETs support two types of communication: vehicle - to- vehicle (V2V) and vehicle to-infrastructure (V2I). Vehicles communicate to RSU for the exchange of keys for the security purpose and RSU communicate to Authentication Server (AS) for the formation of secret keys. But in existing work they perform nonsymmetric cryptography in which XOR operation is performed at authentication server which increases the size of key. In this paper we proposed a technique in which we form the cluster of vehicles then perform login for sending the data. Our results are shown in NS2 simulation which proves that the performance of network improves in terms of Throughput, Routing Overhead and Packet Delivery Ratio.</em><em></em></p><p class="keywords"><strong>Keywords:</strong> VANET, RSU, OBU, TA, Trust, Clustering, Security</p><p class="Articletitle"><strong>Cite this Article</strong></p><p class="Articletitle">Neha Jain, Krishna Kumar Joshi. Improved Performance by Using k-means Clustering in Vehicular Ad Hoc Network. <em>Journal of Communication Engineering & Systems. </em>2017; 7(1): 17–24p.</p>2019-04-05T08:21:01+00:00Copyright (c) 2019 Journal of Communication Engineering & Systemshttps://computerjournals.stmjournals.in/index.php/JoCES/article/view/347Comprehensive Security Analysis of Federated Identity Management2020-05-16T08:19:31+00:00Gargi Amoligamoli86@gmail.comManish Kalagamoli86@gmail.comJitendra Chaurasiagamoli86@gmail.com<p align="center"><strong><em>Abstract</em></strong></p><p><em>Analyzing the security of FIdM is a challenging task, on one hand due to the various modes and options that the protocols provide, and on the other hand due to the inherent complexity of the web. A thorough understanding of the security vulnerabilities is required to remodel a stable and secure authentication system. In this paper the challenges and requirements of securing the exchange of information between enterprises have been reported. The goal of this work is to provide an in-depth security analysis of FIdM protocols. The major FIdM protocols SAML, OpenID and OAuth have been discussed. A narrative of the major security attacks and flaws in existing Federated Identity Management have been presented. The paper explores solutions to resolve the security issues reported in existing FIdM and defines a number of possible countermeasures. </em></p><p class="Abstract"><strong><em>Keywords:</em></strong><em> Federated Identity Management, SAML, OAuth, OpenID, Server Side Request Forgery, Denial-of-Service, Phishing attacks</em></p><p><strong>Cite this Article</strong><strong></strong></p><p>Gargi Amoli, Manish Kala,Jitendra Chaurasia. A Comprehensive Security Analysis of Federated Identity Management. <em>Journal of Communication Engineering & Systems</em>. 2017; 7(1): 11–16p.</p><p class="Abstract"><em><br /></em></p>2019-04-05T06:24:20+00:00Copyright (c) 2019 Journal of Communication Engineering & Systemshttps://computerjournals.stmjournals.in/index.php/JoCES/article/view/344Performance Analysis of DWT Based OFDM System using SRRC Filter in Mobile Wimax over Fading Environment2020-05-16T08:18:45+00:00Harpreet Kaurharpreet_daviet@yahoo.inManoj Kumarharpreet_daviet@yahoo.inAjay K. Sharmaharpreet_daviet@yahoo.inHarjit P. Singhharpreet_daviet@yahoo.in<p align="center"><strong><em>Abstract</em></strong><em></em></p><p><em>Wavelets </em><em>amid its capability to provide simultaneous information in both time and frequency domain, along with minimization of interference and improved bandwidth efficiency, is considered broadly as an efficient approach to replace fast Fourier transform (FFT) in the conventional orthogonal frequency division multiplexing (OFDM) systems. Efficient filter pulses are employed spectrally in such systems in order to mitigate the effect of inter-symbol interference (ISI) as well as satisfy the bandwidth limitations imposed by the multipath fading channels. In this paper, SRRC pulses are employed as transmit and receive filters to perform matched filtering in the wavelet based OFDM system of mobile worldwide interoperability for microwave access (Wimax) that facilitate to meet higher data rate demand along with reducing the probability of errors at the receiver. The physical layer performance of this simulated system is measured and compared in terms of bit error rate (BER) by varying signal to noise ratio (SNR) for different modulation techniques under wireless channel with realistic multipath fading and noisy conditions with path-loss model specifications in a semi-urban environment. The simulation outcome demonstrates significant improvement in BER which substantiates to enhance the performance of the physical layer in mobile Wimax under realistic environment conditions for various modulation schemes. Performance analysis by varying certain parameters of SRRC filter is also demonstrated to measure its comparative effectiveness. The simulation model is developed in MATLAB.</em></p><p><strong>Keywords:</strong><em> Root raised cosine, pulse shaping, oversampling rate, roll-off factor, DWT-OFDM, mobile Wimax</em></p><p class="Articletitle"><strong>Cite this Article</strong></p><p class="Articletitle">Harpreet Kaur, Manoj Kumar, Ajay K. Sharma, Harjit P. Singh. Performance Analysis of DWT Based OFDM System using SRRC Filter in Mobile Wimax over Fading Environment. <em>Journal of Communication Engineering & Systems. </em>2017; 7(1): 1–10p.</p><p><em><br /></em></p>2019-04-03T11:34:22+00:00Copyright (c) 2019 Journal of Communication Engineering & Systemshttps://computerjournals.stmjournals.in/index.php/JoCES/article/view/343Voice over Wi-Fi Employing SIP (Session Initiation Protocol)2020-05-16T08:18:16+00:00Shubham Chowdhryshubham.chowdhry94@gmail.comRavi Jaitlyshubham.chowdhry94@gmail.comShrish Bajpaishubham.chowdhry94@gmail.com<p align="center"><strong><em>Abstract</em></strong><em></em></p><p><em>In the recent years, VoIP and SIP based calling has been emerging as a new innovation and a master technology in reducing all over cost of communication and secure calling among various MNCs and other management based calling centres. Voice over Wi-Fi (VoWi-Fi) emerged after voice over IP (VoIP) and manifests to be a useful technology. It acts as a substitute to usual coaxial cable phone system. The purpose of this research is to design and implement a telephony program that uses Wi-Fi in an end to end link or WLAN (Wireless Local Area Network) as a means of communication between mobile phones at zero cost. The breakthrough in VoWi-Fi may severely alter the cell phone business in the upcoming future due to its lower cost, flexibility and portability. We have briefly discussed on each aspect including, virtualization, SIP, CentOS, softphones and Wi-Fi which are very much engaged in designing the layout as well as in implementation of the idea behind this research. We have also given the future prospects of VoWiFi and its deployment in the various companies.</em></p><p><strong><em>Keywords: </em></strong><em>SIP, VoIP, IP phones<strong>-</strong>phones with logical IP address, Wi-Fi, virtualization</em></p><p class="Author"><strong>Cite this Article</strong></p><p>Shubham Chowdhry, Ravi Jaitly, Shrish Bajpai. Voice over Wi-Fi Employing SIP. Human Tracking and Positioning in Semi Outdoor Area using Ultra Sound Positioning System. <em>Journal of Communication Engineering & Systems.</em> 2016; 6(3): 32–34p.</p><p><em><br /></em></p>2019-04-03T11:12:07+00:00Copyright (c) 2019 Journal of Communication Engineering & Systemshttps://computerjournals.stmjournals.in/index.php/JoCES/article/view/342Human Tracking and Positioning in Semi Outdoor Area using Ultra Sound Positioning System2020-05-16T08:18:06+00:00Saima Almasalmas.saima@gmail.comMd. Humayun Kabiralmas.saima@gmail.com<p class="papertitle"><strong><em>A</em></strong><strong><em>bstract</em></strong><em></em></p><p class="papertitle"><em>In this thesis, we introduced the indoor and semi outdoor location determination problem. The localization accuracy metrics are the mean error per pixel and the room averaged mean error. We have tried to assess the accuracy of the algorithm, as the location and the number of BSs varies, path loss exponent n value changes. By measuring RSS and mean error of our proposed system, it is concluded that the number of BS must be greater than or at least seven. By calculating and measuring the average mean error of all pixels of our proposed system and reducing the value of AME by increasing BSs, we have made our system more efficient than other systems and we have deployed this technique in a semi outdoor environment instead of only indoor.<strong></strong></em></p><p><strong><em>Keywords: </em></strong><em>Human tracking, semi outdoor, ultra sound positioning system, average mean error, receive signal strength</em></p><p class="papertitle"><strong>Cite this Article</strong></p><p>Saima Almas, Md. Humayun Kabir.Human Tracking and Positioning in Semi Outdoor Area using Ultra Sound Positioning System. <em>Journal of Communication Engineering & Systems.</em> 2016; 6(3): 23–31p.</p><p><em><br /></em></p>2019-04-03T10:47:01+00:00Copyright (c) 2019 Journal of Communication Engineering & Systemshttps://computerjournals.stmjournals.in/index.php/JoCES/article/view/341LIS Education Research in India2020-05-16T08:17:39+00:00K. Rajaramjairajaram6@gmail.comS. Jeyachitrajairajaram6@gmail.comS. Subhajairajaram6@gmail.com<p align="center"><strong><em>Abstract</em></strong></p><p><em>Libraries and Information Centres (LICs) play a vital role in the socio-economic development of a nation. The accelerated growth in research and developmental activities in sciences and technology and also in the fields of social sciences and humanities contributed to a phenomenal growth in the universe of subjects resulting in information explosion and interdisciplinary approach to research during the second half of the 20<sup>th</sup> century. These developments generated new demands and pressures on the services offered by the libraries and information centres in our country and elsewhere.</em></p><p><strong><em>Keywords: </em></strong><em>LIS Research, Need, Quality, Observations</em></p><p><strong>Cite this Article</strong><strong> </strong></p><p class="Articletitle">K. Rajaram, S. Jeyachitra, S. Subha. LIS Education Research in India. <em>Journal of Communication Engineering & Systems.</em> 2016; 6(3):17–22p.</p><p><em><br /></em></p>2019-04-03T10:13:41+00:00Copyright (c) 2019 Journal of Communication Engineering & Systemshttps://computerjournals.stmjournals.in/index.php/JoCES/article/view/340A Study on Wireless Sensor Network Deployment and Lifetime Maximization of Wireless Sensor Nodes in Natural Gas Pipeline Monitoring System2020-05-16T08:17:22+00:00Md. Fahad Monirsarjo.das@gmail.comSarjo Dassarjo.das@gmail.comPriyankar Roychowdhurysarjo.das@gmail.com<p align="center"><strong><em>Abstract</em></strong></p><p><em>Leakage in Natural Gas Pipeline is a very common problem that may lead to economic losses, environmental hazards and pollution. Therefore, the maintenance and security monitoring of the natural gas pipeline has remained a big concern for many years. In the recent times, implementation of Wireless Sensor Networks (WSNs) has become very popular. This is due to the low cost and sustainability of WSNs. Since, the implementation of WSNs in different applications has increased rapidly; the energy consumption of WSN’s has also become an important part of study as nodes are powered by battery. In this paper, an architectural model of WSN implementation</em> <em>will be presented. This model can be used for identifying the leakage or other kind of damage monitoring in gas/oil pipelines as well as a process of lifetime maximization of the operating nodes. Moreover, we have studied the effectiveness of equal distance placement scheme, based on Ideal power model and Tmote power model, for WSN’s lifetime maximization in gas pipeline monitoring system. </em></p><p><strong><em>Keywords: </em></strong><em>Wireless sensor networks, gas pipeline monitoring, WSN application, linear sensor placement, lifetime maximization</em></p><p><strong>Cite this Article</strong></p><p>Md. Fahad Monir, Sarjo Das, Priyankar Roychowdhury. A study on Wireless Sensor Network deployment and Lifetime Maximization of Wireless Sensor Nodes in Natural Gas Pipeline Monitoring System. <em>Journal of Communication Engineering & Systems.</em> 2016; 6(3): 7–16p.</p><p><em><br /></em></p>2019-04-03T10:05:51+00:00Copyright (c) 2019 Journal of Communication Engineering & Systemshttps://computerjournals.stmjournals.in/index.php/JoCES/article/view/339Co-planar Waveguide Circular Ring Microstrip Patch Antenna for WLAN Applications2020-05-16T08:17:03+00:00Meenal Katemeenalkate17@gmail.comAnjana Goenmeenalkate17@gmail.com<p align="center"><strong><em>Abstract</em></strong></p><p class="Default"><em>A printed circular microstrip patch antenna with a four rectangular shape strip and co planar rectangular ground plane has been proposed. Four rectangles of dimensions 4.8mm x3mm are arranged in such a manner to achieve both the WLAN frequency band. The bandwidths of 341MHz and 414MHz are achieved having a resonant frequency of 2.37GHz and 5.45GHz respectively. This antenna is printed on the glass epoxy (FR4 lossy) of dielectric substrate with relative permittivity (€r) of 4.3, thickness of 1.6 mm. Other parameters such as directivity, antenna gain, radiation pattern are also analysed with different values of ground plane length. The proposed antenna simulation result is capable of operating over the 2.187–2.527 GHz frequency band and 5.234-5.643 GHz frequency band, which cover the 2.4/5.2GHz, WLAN operating bands.</em></p><p><strong><em>Keywords: </em></strong><em>Circular ring microstrip patch antenna (CRMPA), microstrip patch antenna (MPA), multiband antenna, wireless local area network (WLAN) Antenna</em></p><p><strong>Cite this Article</strong></p><p>Meenal Kate, Anjana Goen. Co-planar waveguide circular ring microstrip patch antenna for WLAN applications. <em>Journal of Communication Engineering & Systems</em>. 2016; 6(3): 1–6p.</p><p><em><br /></em></p>2019-04-03T09:40:51+00:00Copyright (c) 2019 Journal of Communication Engineering & Systemshttps://computerjournals.stmjournals.in/index.php/JoCES/article/view/338Survey Paper on Light Fidelity2020-05-16T08:15:59+00:00Aroma P.H.aromaharidas09@gmail.comPreema Theresa Varghesearomaharidas09@gmail.com<p align="center"><strong><em>Abstract</em></strong><em></em></p><p><em>Nowadays internet has the most important priority in our society, since it had made many changes in our today’s world. Using wireless communication in any public place or deciphering authentication in order to connect internet may lead to aggravation because of stumpy speed. A solution for this concern is LI-FI. This technology was sham by physicist Harald Haas. This technology allows transferring “data in the course of illumination “taking the fiber beyond fiber optics by distributing data through an LED corm that vary strength quicker than creature ogle can tag on. Li-Fi is part of the VLC system. We adopt three types of wireless communication technologies that are; Bluetooth, Wi-Fi, and Wi-Max in order to compare with Li-Fi. The intention of this paper is to cram the fundamentals and developments of Li-Fi by evaluating their main features, behaviors and communication standards in terms of various matrices including transmission time, frequency, nominal range, data coding efficiency, complexity and power consumption. The valuation offered in this paper would help application engineers in selecting an appropriate etiquette.</em></p><p><strong><em>Keywords: </em></strong><em>VLC, Bluetooth, Wi-Fi, Wi-Max</em></p><p class="Articletitle"><strong>Cite this Article</strong></p><p class="Articletitle">Aroma PH, Preema Theresa Varghese. Survey Paper on Light Fidelity. <em>Journal of Communication Engineering & Systems.</em> 2016; 6(2): 21–27p.</p><p><em><br /></em></p>2019-04-03T09:25:25+00:00Copyright (c) 2019 Journal of Communication Engineering & Systemshttps://computerjournals.stmjournals.in/index.php/JoCES/article/view/336A Statistical View Point of Road Accidents due to Mobile Phone Usage while Driving2020-05-16T08:15:51+00:00N. S. Naraharinaraharins@rvce.edu.inPrashant V.naraharins@rvce.edu.in<p align="center"><strong><em>Abstract</em></strong></p><p><em>The proliferation of mobile technology and its widespread use has created an environment of achieving more while driving. Reports related to road accidents estimate that nearly 1.4 million crashes occur as a consequence of drivers being engaged in phone conversation and almost 2 lakh crashes involve distraction due to texts and emails. Driving requires abilities such as attention, memory, judgment, perceptuomotor skills and decision making. The current mobile interface available in market has limitations to adapt to users environment thus it cannot effectively be customized to driving scenario. By a cognitive distraction test conducted using car simulator was seen that driver deviated from the lane 32.5% more times and missed turn signals 31.9% more on an average than drivers without any distraction. Therefore, there is a scope to design user interface (UI) that would address driver distraction holistically and understand user’s behaviour and pain points that would not only make driving experience safer but also create value in terms of driving convenience.</em></p><p><strong><em>Keywords: </em></strong><em>Mobile technology, cognitive distraction, user interface, driver behaviour, road accidents</em></p><p> </p>2019-04-03T09:06:49+00:00Copyright (c) 2019 Journal of Communication Engineering & Systemshttps://computerjournals.stmjournals.in/index.php/JoCES/article/view/335Review on Digital Filter Design Using Artificial Neural Network2020-05-16T08:15:42+00:00Suchi Sharmasuruchisharma89@yahoo.inAnjana Goensuruchisharma89@yahoo.in<p align="center"><strong><em>Abstract</em></strong><em></em></p><p><em>This paper provides a survey report on designing digital FIR filters with the help of artificial neural network (ANN) proposed by many researchers who gives a better results and easy way to design a filter. It includes types of filters, window techniques, artificial neural network, comparative analysis of various existing work. This paper gives a better way to analyze various techniques used to design FIR filters. This survey report provides the performance analysis of many researchers work.</em></p><p><strong><em>Keywords:</em></strong><em> Filter, window techniques, artificial neural network</em></p><p class="Default"><strong>Cite this Article</strong></p><p>Suchi Sharma, Anjana Goen. Review on Digital Filter Design Using Artificial Neural Network<em>. </em><em>Journal of Communication Engineering & Systems.</em> 2016; 6(2): 9–15p.</p><p><em><br /></em></p>2019-04-03T08:34:37+00:00Copyright (c) 2019 Journal of Communication Engineering & Systemshttps://computerjournals.stmjournals.in/index.php/JoCES/article/view/334Performance Evaluation of Library and Information Centers2020-05-16T08:15:31+00:00K. Rajaramjairajaram6@gmail.comS. Jeyachitrajairajaram6@gmail.comD. Lavanyajairajaram6@gmail.com<p align="center"><strong><em>Abstract</em></strong><em></em></p><p><em>Traditionally, libraries have been evaluated in terms of input or available resources, such as number of volumes, number of staff members, size of facilities, and so on. More recently, there has been a vigorous movement toward evaluating libraries according to their output of performance. This latter evaluation focuses on what was accomplished with the library’s resources. Many of the performance measures developed thus far have concentrated on such factors as library effectiveness, the library’s impact on the community, and user satisfaction.</em></p><p><strong><em>Keywords: </em></strong><em>Performance, measurement, terminology, information service</em></p><p><strong>Cite this Article</strong><strong></strong></p><p>K. Rajaram, S. Jeyachitra, D. Lavanya. Performance Evaluation of Library and Information Centers. <em>Journal of Communication Engineering & Systems. </em>2016; 6(2): 5–8p.</p><p><em><br /></em></p>2019-04-03T07:25:01+00:00Copyright (c) 2019 Journal of Communication Engineering & Systemshttps://computerjournals.stmjournals.in/index.php/JoCES/article/view/333Evaluation of System Study in Library and Information Science2020-05-16T08:13:59+00:00K. Rajaramjairajaram6@gmail.comS. Jeyachitrajairajaram6@gmail.comB.S. Swaroop Ranijairajaram6@gmail.com<p align="center"><strong><em>Abstract</em></strong></p><p><em>The word ‘system’ has become a common term, often applied to things which seem large or complex. It is so frequently encountered, that it can become quite difficult to decide what it means even within a defined context. When a manufacturer of washing powder, computer programmers, doctors, economists, astronomers and ecologists use the same word, ‘system’, in describing their interests, can anyone be sure what they mean? What is the connection between the solar system and the monetary system? Do the skeletal system and a computer system have anything in common? Can we sensibly compare the ecological system of our plant and a brand-new washing system’ of the detergent manufacturer?</em></p><p><strong><em>Keywords: </em></strong><em>System, components, analysis, system design, steps in designing</em></p><p class="Default"><strong>Cite this Article</strong></p><p>K. Rajaram, S. Jeyachitra, B.S. Swaroop Rani. Evaluation of System Study in Library and Information Science. <em>Journal of Communication Engineering & Systems.</em> 2016; 6(2): 1–4p.</p><p><em><br /></em></p>2019-04-03T07:17:08+00:00Copyright (c) 2019 Journal of Communication Engineering & Systemshttps://computerjournals.stmjournals.in/index.php/JoCES/article/view/332Evaluation of Effect of Seeds and Downloaders on the Performance of BitTorrent Network using Markov Chain Modeling2020-05-16T08:11:38+00:00Rupesh Jaiswalrcjaiswal@pict.eduShailesh Mitkarircjaiswal@pict.eduShashikant Lokhandercjaiswal@pict.edu<p class="Abstract" align="center"><strong><em>Abstract</em></strong><em></em></p><p class="Abstract"><em>In this paper, we are using existing Markov chain model to study the effect of count of seeds and downloaders on transition rates, which is an important parameter in Markov chain modeling. As of now, many analytical modeling techniques are used to evaluate the performance of BitTorrent network and Markov chain model is found to be an effective, accurate and extendible one. Many researchers have studied BitTorrent networks to evaluate the distinct performance metrics using Markov chain modeling technique. Here Matlab environment is used to analyze the change in transition rates as the count of seeds and downloaders in the system varies. Also two chunk model is extended to three chunk model and observe the same behavior as of two chunk model’s transition rate due to change in seed’s count.</em></p><p class="Abstract"><strong><em>Keywords: </em></strong><em>Markov chain, seeds, BitTorrent, transition rate</em></p><p><strong>Cite this Article</strong></p><p>Rupesh Chandrakant Jaiswal, Shailesh Mitkari, Shashikant Lokhande.<strong><em> </em></strong>Evaluation of Effect of Seeds and Downloaders on the Performance of BitTorrent Network using Markov Chain Modeling. <em>Journal of Communication Engineering & Systems.</em> 2016; 6(1): 30–37p.</p><p class="Abstract"><em><br /></em></p>2019-04-03T07:04:52+00:00Copyright (c) 2019 Journal of Communication Engineering & Systemshttps://computerjournals.stmjournals.in/index.php/JoCES/article/view/331New Generation of Knowledge Management in LIS Professionals2020-05-16T08:11:25+00:00K. Rajaramjairajaram6@gmail.comS. Jeyachitrajairajaram6@gmail.comB.S. Swaroop Ranijairajaram6@gmail.com<p align="center"><strong><em>Abstract</em></strong></p><p><em>Knowledge management is concerned with creating organizations and societies in which subjective or tacit knowledge can be converted into objective knowledge and shared in the pursuit of communal or organizational objectives; and is the domain of politicians, chief executives and senior managers.<strong></strong></em></p><p><strong><em>Keywords: </em></strong><em>Knowledge management, information management, information strategic, knowledge workers</em></p><p><strong>Cite this Article</strong></p><p>K. Rajaram, S. Jeyachitra, B.S. Swaroop Rani. New Generation of Knowledge Management in LIS Professionals. <em>Journal of Communication Engineering & Systems.</em> 2016; 6(1): 26–29p.</p><p><em><br /></em></p>2019-04-03T06:10:42+00:00Copyright (c) 2019 Journal of Communication Engineering & Systemshttps://computerjournals.stmjournals.in/index.php/JoCES/article/view/330Simulation of Differential Space Time Block Coding2020-05-16T08:11:08+00:00Toral P. Zinzuwadiatpzinzuwadia@aits.edu.inDipika R. Gosaitpzinzuwadia@aits.edu.in<p align="center"><strong><em>Abstract</em></strong><em></em></p><p><em>In such a coherent system, the underlying assumption is that the channel does not change during one frame of data. Thus, it can also be interpreted as the frame length is chosen such that the path gain change during one frame is negligible. This is basically the quasi-static fading assumption that we have used so far. There is a bandwidth penalty due to the number of transmitted pilot symbols. Of course, choosing a longer frame reduces this bandwidth penalty; however, on the other hand, the quasi-static assumption is less valid for longer frames. So, there is a compromise between the frame length and the accuracy of the channel estimation. DSTBC requires that the transmission of symbols is known to the receiver at the beginning and hence is not truly differential. So, we can interpret as the joint channel and data estimation which can lead to error propagation.</em></p><p><strong><em>Keywords: </em></strong><em>DSTBC (Differential space time block coding), MIMO (Multiple input multiple output), DPSK (Differential phase shift keying), STBC (Space time block code), CSI (Channel state information)</em></p><p><strong>Cite this Article </strong></p><p class="Articletitle">Toral P. Zinzuwadia, Dipika R. Gosai.<em> </em>Simulation of Differential Space Time Block Coding. <em>Journal of Communication Engineering and Systems.</em> 2015; 6(1): 19–25p.</p><p><em><br /></em></p><p> </p><p> </p>2019-04-03T05:46:07+00:00Copyright (c) 2019 Journal of Communication Engineering & Systemshttps://computerjournals.stmjournals.in/index.php/JoCES/article/view/329Library Resource Sharing and Networking2020-05-16T08:10:55+00:00K. Rajaramjairajaram6@gmail.comS. Jeyachitrajairajaram6@gmail.comB. S. Swaroop Ranijairajaram6@gmail.com<p align="center"><strong><em>Abstract</em></strong></p><p><em>Libraries in the past had only written or printed documents. Written documents are manuscripts. These documents are always kept away and are not shared with other libraries. The users are expected to visit the library for consultation. The other category; the books were also not loaned to everyone and they were seldom shared with other libraries. With the introduction of printing by movable types, books started appearing in good number and libraries have started accepting the concept of sharing their books with other libraries.</em></p><p><strong><em>Keywords: </em></strong><em>Resource sharing, acquisition, processing, inter-library-loan, networking, library networks, network organization</em></p><p class="Articletitle"><strong>Cite this Article</strong></p><p class="Articletitle">Rajaram K, Jeyachitra S, Swaroop Rani BS. Library Resource Sharing and Networking. <em>Journal of Communication Engineering & Systems</em>. 2016; 6(1): 15–18p.</p><p><em><br /></em></p><p> </p>2019-04-03T05:15:41+00:00Copyright (c) 2019 Journal of Communication Engineering & Systemshttps://computerjournals.stmjournals.in/index.php/JoCES/article/view/328Capacity and BER Performance Analysis of Single Cell Massive MIMO with Various Precoding Techniques2020-05-16T08:10:45+00:00Md. Mahfuzur Rahmanmdmahfuzurrahman@outlook.comMd. Abu Bakar Siddiquimdmahfuzurrahman@outlook.com<p align="center"><strong><em>Abstract</em></strong></p><p><em>Massive </em><em>Multi Input Multi Output (</em><em>MIMO) is one of the promising technologies which will facilitate the 5th generation wireless communication system (5G) in the near future. It also goes by other names such as, large MIMO, hyper MIMO, full-dimension MIMO and ARGOS. In this technology the Base Station is incorporated with a large number of transmitting antennas (e.g., Hundreds, thousands). A large number of antenna help to focus the energy into smaller regions of space, which results improvement in throughput and radiate energy efficiency of the system. Other benefits include use of inexpensive, low-power components, reduced latency, simplification of MAC layer, etc. Massive MIMO uncovers a new area of research in MIMO technology. One of the challenges of massive MIMO is finding an optimal precoding technique. A suitable precoding technique is essential to exploit the maximum potential of the massive MIMO system as well as to eliminate some limitation (e.g., Pilot contamination). In this paper, we have analyzed the performance of a massive MIMO system in terms of capacity and Bit Error Rate (BER) for different precoding techniques to find an optimal precoding technique. We have compared numerous precoding techniques such as, MMSE, ZF, MRT, RZF and TPE to each other to choose one optimal precoding technique for the massive MIMO system.</em><em></em></p><p><strong><em>Keywords: </em></strong><em>Massive MIMO, 5G, Precoding, Capacity, BER, ZF, MMSE, MRT, RZF, TPE</em></p><p class="Articletitle"><strong>Cite this Article</strong></p><p class="Articletitle">Md. Mahfuzur Rahman, Md. Abu Bakar Siddiqui, Capacity and BER Performance Analysis of Single Cell Massive MIMO with Various Precoding Techniques. <em>Journal of Communication Engineering & Systems.</em> 2016; 6(1): 1–14p.</p><p><em><br /></em></p><p> </p>2019-04-03T04:39:57+00:00Copyright (c) 2019 Journal of Communication Engineering & Systemshttps://computerjournals.stmjournals.in/index.php/JoCES/article/view/327PAPR Reduction using Selective Mapping Method for OFDM Communication Systems2020-05-16T08:09:27+00:00Shatrughna Prasad Yadavspyadav68@gmail.comSubhash Chandra Beraspyadav68@gmail.com<p class="Keywords" align="center"><strong><em>Abstract</em></strong></p><p><em>Selective mapping method (SLM) is one of the most important techniques used for peak-to-average power ratio (PAPR) reduction of orthogonal frequency division multiplexing (OFDM) communication system. It is simple in implementation, gives distortionless transmission and reduces PAPR significantly. Mathematical modelling and Matlab simulation have been carried out to analyse its performances. At </em> <em> of CCDF, PAPR values for OFDM signal without applying any reduction technique is </em><em>11.5, 11.8, 12.1, 12.4 and 12.6 dB </em><em>for 64, 128, 256, 512 and 1024 numbers of subcarriers respectively. When compared with OFDM signal, the reduction in PAPR value with SLM technique are 5.4, 4.4, 4.3, 4.1 and 3.9 dB with 64, 128, 256, 512 and 1024 number of subcarriers respectively for number of phase vectors equal to 16. There is reduction in the value of PAPR with decrease in number of sub carriers and increase in value of phase vectors. But this reduction in PAPR has been obtained at the cost of slight reduction in transmission data rate as side information has to be transmitted to the receiver having information about the phase vector which produces minimum PAPR value.</em></p><p class="Keywords"><strong><em>Keywords:</em></strong><em> Selective mapping method, OFDM, high power amplifier, peak-to-average power ratio, multi carrier communication</em></p>2019-04-03T04:13:50+00:00Copyright (c) 2019 Journal of Communication Engineering & Systemshttps://computerjournals.stmjournals.in/index.php/JoCES/article/view/325Intellectual Property Rights in LIS2020-05-16T08:08:41+00:00K. Rajaramjairajaram6@gmail.comS Jeyachitrajairajaram6@gmail.comS Jeyachitrajairajaram6@gmail.comBS Swaroop Ranijairajaram6@gmail.comBS Swaroop Ranijairajaram6@gmail.com<p align="center"><strong><em>Abstract</em></strong></p><p><em>In the world of intellectual creativity, the rights of the owners of copyright have taken a long time to be understood. The concept of copyright that it is the outcome of the hard labor of a creative person has been difficult for people to understand. Not long ago, people thought that they could use and enjoy the writings of an author, the music of a composer and the paintings of an artist freely without realizing that the creator had to be compensated. In the modern world, where everything has to be acquired by paying some amount of compensation to the owner, the fact that a creative work has also to be paid for is much less understood in developing countries than in advanced countries.</em></p><p><strong><em>Keywords: </em></strong><em>History, need for awareness, copyright in India, legislations covering, impact of new technology</em></p><p><strong>Cite this Article</strong></p><p>Rajaram K,<strong> </strong>Jeyachitra S, Swaroop Rani BS. Intellectual property rights in LIS. <em>Journal of Communication Engineering & Systems.</em> 2015; 5(3): 44–49p.</p><p><em><br /></em></p>2019-04-03T04:01:12+00:00Copyright (c) 2019 Journal of Communication Engineering & Systemshttps://computerjournals.stmjournals.in/index.php/JoCES/article/view/326Hypothesis Analysis in Library and Information Science2020-05-16T08:08:30+00:00K. Rajaramjairajaram6@gmail.comS Jeyachitrajairajaram6@gmail.comBS Swaroop Ranijairajaram6@gmail.com<p class="Default" align="center"><em><strong>Abstract</strong></em></p><p><em>Hypotheses can be regarded as suggestions of possible connections between actual facts or imagined ones. The question of the truth of hypotheses need not, therefore, always be raised. The necessary feature of a hypothesis, from this point of view, is that it should be stable in a determinate form, so that implications can be discovered by logical means.</em></p><p><em><strong>Keywords:</strong></em><em> Hypothesis and scientific method, need and purpose, collection of data</em></p><p><strong>Cite this Article</strong></p><p>Rajaram K,<em> </em>Jeyachitra S, Swaroop Rani BS.<em> </em>Hypothesis analysis in library and information science. <em>Journal of Communication Engineering & Systems.</em><strong> </strong>2015; 5(3): 36–43p.</p><p><em><br /></em></p>2019-04-03T03:37:39+00:00Copyright (c) 2019 Journal of Communication Engineering & Systemshttps://computerjournals.stmjournals.in/index.php/JoCES/article/view/324User, User Studies and User Education in LIS2020-05-16T08:08:22+00:00K. Rajaramjairajaram6@gmail.comS Jeyachitrajairajaram6@gmail.comBS Swaroop Ranijairajaram6@gmail.com<p align="center"><strong><em>Abstract</em></strong><em></em></p><p><em>User education is a programme designed and operated by the library/information personnel to teach the users about the resources, the ways to locate the resources and exploit the resources. The user education programmes are to be organised on a regular basis and from time to time. User education range from initiating a fresh user into the library/information system – teaching about the layout of the library, various units and their location, services offered by the library and how he/she can take the best advantage of the library/information system to specialized training in the areas of collecting data, analyzing the same, processing and assimilation. </em></p><p><strong><em>Keywords: </em></strong><em>User, user studies, user education</em></p><p><strong>Cite this Article</strong></p><p>RajaramK, Swaroop RaniBS, Jeyachitra S.User, User Studies and User Education in LIS. <em>Journal of Communication Engineering & Systems. </em>2015; 5(3): 27–35p.</p><p><em><br /></em></p>2019-04-02T11:23:08+00:00Copyright (c) 2019 Journal of Communication Engineering & Systemshttps://computerjournals.stmjournals.in/index.php/JoCES/article/view/323Investigations on PAPR Reduction using PTS Technique for OFDM Communication Systems2020-05-16T08:07:39+00:00Shatrughna Prasad Yadavspyadav68@gmail.comSubhash Chandra Beraspyadav68@gmail.com<p class="Keywords" align="center"><strong><em>Abstract</em></strong></p><p class="Abstract"><em>Orthogonal Frequency Division Multiplexing (OFDM) is a spectral efficient technique for high data rate communication systems. It also provides robustness to multipath frequency selective fading but suffers from high peak-to-average power ratio (PAPR) and causes high power amplifiers to operate in the nonlinear region. In this paper partial transmit sequence (PTS) as PAPR reduction technique has been investigated. Mathematical modelling and Matlab simulation have been carried out to analyse its performances. At 0.01 percent of CCDF, PAPR values for OFDM signal without applying any reduction technique are 11.5, 11.8, 12.0, 12.2 and 12.5 dB for 64, 128, 256, 512 and 1024 number of subcarriers respectively. Whereas with PTS technique with 16 number of sub blocks, the corresponding values are 6.4, 7.0, 7.6, 8.1, 8.4 and dB respectively. PTS method reduces the PAPR value by 4.1 dB than that of the OFDM signal with 1024 number of sub carriers.</em></p><p class="Keywords"><strong><em>Keywords: </em></strong><em>Orthogonal frequency division multiplexing, partial transmit sequence, peak-to-average power ratio, nonlinear,</em> <em>amplifiers</em></p><p class="Articletitle"><strong>Cite this Article</strong></p><p class="Articletitle">Shatrughna Prasad Yadav, Subhash Chandra Bera. Investigations on PAPR Reduction using PTS Technique for OFDM Communication Systems. <em>Journal of Communication Engineering & Systems</em>. 2015; 5(3): 19–26p.</p><p class="Keywords"><em><br /></em></p>2019-04-02T11:13:13+00:00Copyright (c) 2019 Journal of Communication Engineering & Systemshttps://computerjournals.stmjournals.in/index.php/JoCES/article/view/322Comparative Performance Analysis of Inter-Domain Routing Protocols in Integrated HSDPA and WLAN Ad Hoc Networks with Streaming Traffic2020-05-16T08:07:18+00:00Shashank Tripathishashankt.ic.12@nitj.ac.inA K Jainshashankt.ic.12@nitj.ac.in<p class="Abstract" align="center"><strong><em>Abstract</em></strong></p><p class="Abstract"><em>Integration of HSDPA and WLAN Ad Hoc Networks is to increase coverage and capacity of UMTS Networks. Inter-Domain routing is new challenge for them due multiple hopes away end users. This paper presents a comparative performance analysis for Inter-domain routing in Integrated HSDPA and WLAN Ad Hoc Networks with asymmetric voice and video streaming traffic class on BellmanBGPv4, Bellman, RIPv2 and RIPv2BGPv4 routing protocols.</em><em></em></p><p class="keywords"><strong>Keywords:</strong> Integrated HSDPA and WLAN Ad Hoc networks, inter-domain routing, bellman BGPv4, bellman, RIPv2, RIPv2BGPv4</p><p> <strong>Cite this Article</strong></p><p>Shashank Tripathi, A. K. Jain. Comparative Performance Analysis of Inter-Domain Routing Protocols in Integrated HSDPA and WLAN Ad Hoc Networks with Streaming Traffic. <em>Journal of Communication Engineering & Systems</em>. 2015; 5(3): 7–18p.</p>2019-04-02T10:58:54+00:00Copyright (c) 2019 Journal of Communication Engineering & Systemshttps://computerjournals.stmjournals.in/index.php/JoCES/article/view/321BER Analysis of STBC MIMO-OFDM with ICI Cancellation2020-05-16T08:06:48+00:00Rajni Goyalrajnir8@gmail.comAnkush Kansalrajnir8@gmail.com<p align="center"><strong><em>Abstract</em></strong></p><p><em>Space Time Block Code (STBC) Multiple Input Multiple Output (MIMO) Orthogonal Frequency Division Multiplexing (OFDM) has been considered as the best technology for upcoming wireless communication systems because of its capability to transmit large data rates. But the given systems suffer from various major problems; like Carrier Frequency Offset (CFO), timing offset carrier phase noise and Intersymbol Interference (ISI) issues. In this research work, the carrier frequency offset has been solved by using Intercarrier carrier interference (ICI) self cancellation technique. By performing simulation for given system using ICI self cancellation technique it has been observed that there is an improvement of 3dB in the proposed system at bit error rate (BER) of 10<sup>-3.7</sup> for normalized CFO of 0.3 and for normalized CFO of 0.15 there is improvement of 3dB but at the BER of 10<sup>-3 </sup>as compared totraditional MIMO systems.</em></p><p><strong><em>Keywords:</em></strong><em> MIMO, OFDM, STBC, CFO, ICI, BER, SNR, PAPR, IBI, FFT</em></p><p><strong>Cite this Article</strong><strong></strong></p><p>Rajni Goyal, Ankush Kansal.BER Analysis of STBC MIMO-OFDM with ICI Cancellation. <em>Journal of Communication Engineering & Systems.</em> 2015; 5(3): 1–6p.</p><p><em><br /></em></p>2019-04-02T10:11:17+00:00Copyright (c) 2019 Journal of Communication Engineering & Systemshttps://computerjournals.stmjournals.in/index.php/JoCES/article/view/320Comparison of AODV and DSR Routing Protocols by using Mobility Model in Vehicular Ad-Hoc Network2019-04-02T05:49:16+00:00Monika Shakyashakyam93@gmail.comKaruna Markamshakyam93@gmail.com<p class="Default" align="center"><strong><em>Abstract</em></strong></p><p class="Default"><em>Vehicular ad hoc network is a type of network that provides the communications between vehicle and road side; vehicle and vehicle; and vehicle and infrastructure. VANET has new applications and features for travelers for providing vehicle related information for safety purpose that has never been possible in past. It is an application of MANET. In MANET the node is communicating with the base station. The present paper is mainly intended to compare the routing protocols for the improvement of network services by comparing them in terms of throughput and end to end delay by using Qualnet 6.1. The research work evaluates the performance of two protocols namely AODV and DSR </em><em>to provide multihop routes from node to the server. All mobile nodes were randomly positioned in the network.</em><em></em></p><p class="Default"><strong><em>Keywords: </em></strong><em>VANET, MANET, AODV, DSR, QUALNET</em></p><p><strong>Cite this Article</strong></p><p>Monika Shakya, Karuna Markam.<em> </em>Comparison of AODV and DSR Routing Protocols by using Mobility Model in Vehicular Ad-Hoc Network. <em>Journal of Communication Engineering & Systems. </em>2015; 5(2): 24–29p.</p><p class="Default"><em><br /></em></p>2019-04-02T05:48:33+00:00Copyright (c) 2019 Journal of Communication Engineering & Systemshttps://computerjournals.stmjournals.in/index.php/JoCES/article/view/319Widespread Dissemination of Library Resources through Remote Access2019-04-02T05:48:52+00:00Tawfeeq Nazirtawfeeq17@gmail.com<p align="center"><strong><em>Abstract</em></strong></p><p><em>Presently Libraries are providing a wide range of online resources to their users. They have named the means called “digital library” or “virtual library”. Consequently virtual library can be called as Internet based information retrieval system. The notion of “virtual library” is that any person who has a computer can access not only the resources of the library but also access diversity of information accessible on Internet, or on Intranet without being actually present in library. The ICT has given various remote access software using, which user can access library resources from anywhere, this not only improves the usage of resources but also give the delight feel for the librarians to linger connected with its users always. </em></p><p><strong><em>Keywords: </em></strong><em>Virtual library, digital library, remote access, off-campus</em></p><p><strong>Cite this Article</strong></p><p>Tawfeeq Nazir. Widespread Dissemination of Library Resources through Remote Access. <em>Journal of Communication Engineering & Systems (JoCES).</em> 2015; 5(2): 21–23p.</p><p><em><br /></em></p><p> </p>2019-04-02T05:35:08+00:00Copyright (c) 2019 Journal of Communication Engineering & Systemshttps://computerjournals.stmjournals.in/index.php/JoCES/article/view/318Recognition of Unconstrained Handwritten Digits Using Feedforward MLP and Projection Profile2019-04-02T05:48:52+00:00Rohit Kumar Singher.rohitsingh01@gmail.comNidhi Gulatier.rohitsingh01@gmail.comRavi Yadaver.rohitsingh01@gmail.com<p align="center"><strong><em>Abstract</em></strong></p><p><em>This paper presents a new approach to off-line handwritten numeral recognition using feedforward MLP and projection profile. Different writers have variations in their handwriting since each writer possesses own writing speed, own styles, sizes or positions for numeral or text. Recognition of handwritten numerals poses serious problems because of high variability in numeral shapes written by individuals. The performance of character recognition system depends heavily on what kind of features extraction techniques are being used. Here a handwritten numeral is scanned and this image is fed into the computer in which it is recognized using projection profile, and converted into the same word in equivalent printed characters. This paper focusses on recognition and classification of various numeral recognition techniques.</em></p><p><strong>Keywords:</strong> Handwritten numeral recognition, feedforward MLP, projection profile</p><p><strong>Cite this Article</strong></p><p>Singh RK, Gulati N, Yadav R.<em> </em>Recognition of Unconstrained Handwritten Digits Using Feedforward MLP and Projection Profile. <em>Journal of Communication Engineering & Systems.</em> 2015; 5(2): 15–20p.</p>2019-04-01T11:33:27+00:00Copyright (c) 2019 Journal of Communication Engineering & Systemshttps://computerjournals.stmjournals.in/index.php/JoCES/article/view/317Optimized Companding Technique using Firefly Algorithm for PAPR Reduction in OFDM System2019-04-02T05:48:52+00:00Kratika Mittalkratikam@gmail.comRekha Guptakratikam@gmail.com<p align="center"><strong><em>Abstract</em></strong></p><p><em>The current trends in wireless industry are based on multi-carrier transmission technique such as Orthogonal Frequency Division Multiplexing (OFDM) which provides high data rates and is highly immune to frequency selective fading. However, OFDM is handicapped with a major problem of high peak-to-average power ratio (PAPR), which gives rise to non-linear distortion, inter-symbol interference and out-of-band radiation. Several PAPR reduction techniques have been devised over the last few decades in order to surpass this problem of PAPR. In this paper we have analysed the effectiveness of Companding technique which is optimized using Firefly algorithm for PAPR reduction and the simulation results are compared with other techniques proposed in literature.</em></p><p><strong><em>Keywords: </em></strong> <em> law, CCDF, Companding, Firefly algorithm, OFDM, PAPR, SLM</em></p><p><strong>Cite this Article </strong></p><p>Kratika Mittal, Rekha Gupta. Optimized Companding Technique using Firefly Algorithm for PAPR Reduction in OFDM System. <em>Journal of Communication Engineering & Systems</em>. 2015; 5(2): 8–14p.</p><p><em><br /></em></p>2019-04-01T11:22:20+00:00Copyright (c) 2019 Journal of Communication Engineering & Systemshttps://computerjournals.stmjournals.in/index.php/JoCES/article/view/316Performance Analysis of Wireless Propagation Model to Improve Signal Strength and BER for Wireless Mobile Network2019-04-02T05:48:52+00:00Samta .samtakadyan7@gmail.comKusum Grewal Dangisamtakadyan7@gmail.com<p align="center"><strong><em>Abstract</em></strong></p><p><em>Whenever we setup a network, environment properties such as fading, scattering etc. plays a very important role in choosing spectrum and method of propagation. The spectrum deals with frequency range suitable for communication in a particular environment, and the propagation method deal with channel selection, channel sensing and to perform quality communication throughout the network. To achieve quality output from the network, it is necessary to define network under different constraints. In this paper, a proposed constraints satisfaction problem (CSP) algorithm is used to communication in network through different propagation channel model. The communication signal strength depends on the propagation channel model type used in the given network. Propagation channel model is also affected by the given environment and communication parameters. Three propagation channel model are Rayleigh propagation channel model, Friis free space channel model and Log normal channel model used for communication in the given network. </em><em>Bit error rate (</em><em>BER) and propagation loss is analyzed in different mobile network topology using proposed CSP algorithm<strong>.</strong></em></p><p><strong><em>Keywords: </em></strong><em>Wireless mobile network, BER, Rayleigh propagation model, shadowing propagation model, CSP algorithm</em></p><p><strong>Cite this Article</strong></p><p>Samta, Dangi KG. Performance Analysis of Wireless Propagation Model to Improve Signal Strength and BER for Wireless Mobile Network. <em>Journal of Communication Engineering & Systems.</em> 2015; 5(2): 1–7p.</p><p><em><br /></em></p>2019-04-01T11:12:57+00:00Copyright (c) 2019 Journal of Communication Engineering & Systemshttps://computerjournals.stmjournals.in/index.php/JoCES/article/view/315Trend of LIS Education in Abroad2020-05-16T08:05:07+00:00K. Rajaramjairajaram6@gmail.comS. Jeyachitrajairajaram6@gmail.comT. Rajanjairajaram6@gmail.com<p align="center"><strong><em>Abstract</em></strong></p><p><em>In the current world scenario, where the whole world has become a digital village, students are more comfortable using digital tools rather than looking into books. Instead of looking for information in books like encyclopedia’s today’s generation is more dependent upon websites like Yahoo, Google and OPAC etc. The paper analyzes the nature and extent of major curricular change in LIS education. Multiple methods were used to collect data, including surveys, case studies, content analysis and interviews. </em></p><p><strong><em>Keywords:</em></strong><em> LIS, education, WISE, IMLS</em></p><p><strong>Cite this Article</strong></p><p>Rajaram K, Dr. Jeyachitra S, Rajan T. Recent Development in LIS. <em>Journal of Communication Engineering & Systems (JoCES)</em>.2015; 5 (1): 30–33p.<strong></strong></p><p><em><br /></em></p>2019-04-01T11:03:15+00:00Copyright (c) 2019 Journal of Communication Engineering & Systemshttps://computerjournals.stmjournals.in/index.php/JoCES/article/view/314Innovative Developments of Optical Fiber using Multiplexing/Demultiplexing2020-05-16T08:04:58+00:00Abd El–Naser A. Mohamedahmed_733@yahoo.com<p align="center"><strong><em>Abstract</em></strong></p><p><em>As of late, numerous exploration works have been centered around the fiber optic gadgets for optical correspondence frameworks. One of the principle hobbies is on the optical intensifiers to support a powerless flag in the correspondence frameworks. Keeping in mind the end goal to conquer the confinements forced by electrical recovery, a method for optical intensification was looked for. The contending innovation developed: the first was Raman enhancement. One reason was that the optical pump forces needed for Raman enhancement were altogether higher than that for Erbium doped fiber intensifier (EDFA), and the pump laser innovation couldn't dependably convey the obliged forces. In any case, with the change of pump laser innovation Raman intensification is currently a vital method for growing compass transmission scope and limit. We have profoundly contemplated a scientific model for optical circulated Raman intensifiers (DRAs) in the transmission sign power and pump control inside Raman intensification procedure in co-pumped, counter-pumped, and bi-directional pumping heading arrangements through diverse sorts of fiber link media. The legitimacy of this model was affirmed by utilizing exploratory information and numerical reproductions.</em><em> </em></p><p><strong><em>Keywords:</em></strong><em> Distributed Raman amplifier, fiber link media</em></p><p><strong>Cite this Article</strong></p><p><em>Mahmoud MA. Innovative Developments of Optical Fiber using Multiplexing/Demultiplexing. <em>Journal of Communication Engineering & System.</em> 2015; 5(1): 21–29p.<br /></em></p>2019-04-01T10:53:15+00:00Copyright (c) 2019 Journal of Communication Engineering & Systemshttps://computerjournals.stmjournals.in/index.php/JoCES/article/view/313Background Suppression for Visual Surveillance Using SOM2020-05-16T08:04:30+00:00Simi P. Thomassimi3839@gmail.comAnu Josesimi3839@gmail.comResma Chandran V. P.simi3839@gmail.comSunu Ann Thomassimi3839@gmail.com<p align="center"><strong><em>Abstract</em></strong></p><p><em>Background suppression is widely used approach for detection of moving objects in video streams which is the first relevant step of information extraction in many computer vision applications. Aside from the intrinsic usefulness of being able to segment video streams into moving and background components, detecting moving objects provides a focus of attention for recognition, classification, and activity analysis, making these later steps more efficient. An approach based on self-organization through artificial neural networks, widely applied in human image processing systems and more generally in cognitive science is proposed. This approach can handle scenes containing moving backgrounds, gradual illumination variations and camouflage, has no bootstrapping limitations, can include into the background model shadows cast by moving objects, and achieves robust detection for different types of videos taken with stationary cameras.</em><strong><em></em></strong></p><p><strong><em>Keywords</em></strong><em>: background suppression, motion detection, neural network, self-organization, visual surveillance</em></p><p><strong>Cite this Article</strong></p><p>Thomas SP, Jose A, ResmaChandran VP, Thomas SA. Background Suppression for Visual Surveillance Using SOM. <em>Journal of Communication Engineering & Systems (JoCES</em>). 2015; 5(1): 15–20p.</p><p><em><br /></em></p>2019-04-01T08:31:38+00:00Copyright (c) 2019 Journal of Communication Engineering & Systemshttps://computerjournals.stmjournals.in/index.php/JoCES/article/view/312Recent Development in LIS2020-05-16T08:04:10+00:00K. Rajaramjairajaram6@gmail.comS. Jeyachitrajairajaram6@gmail.comT. Rajanjairajaram6@gmail.com<p align="center"><strong><em>Abstract</em></strong></p><p><em>Innovation of information and communication technology has made a new era of library and information sector. The high speed data processing techniques, advancement in the storage medium and improved telecommunication systems have made profound impact on the activities.</em></p><p><em> </em></p><p><strong><em>Keywords: </em></strong><em>information and communication technology, library and information science (LIS), web, blog</em></p>2019-04-01T07:18:52+00:00Copyright (c) 2019 Journal of Communication Engineering & Systemshttps://computerjournals.stmjournals.in/index.php/JoCES/article/view/311Digital Audio Watermarking: An Overview2020-05-16T08:03:38+00:00Ankita Tiwariatiwari.tiwari63@gmail.comLalit Jainatiwari.tiwari63@gmail.com<h1 align="center"><em>Abstract</em></h1><p><em>A real watermarking procedure is required for copyright security and confirmation of protected innovation. This work recommends an advanced watermarking procedure which makes utilization of concurrent recurrence veiling to conceal the watermark data. The calculation is grounded on Psychoacoustic auditory model and Spread spectrum hypothesis. It creates a watermark sign utilizing spread range hypothesis and implants it into the sign by measuring the covering edge utilizing modified Psychoacoustic auditory model. The contrast between the first and the watermarked duplicate is intangible as the watermark is formed to lie beneath the veiling edge. Recuperation of the watermark is performed without the learning of the first flag. </em></p><p><em> </em></p><p><strong><em>Keywords: </em></strong><em>Watermarking, Psychoacoustic auditory model, copyright security</em></p>2019-04-01T07:05:44+00:00Copyright (c) 2019 Journal of Communication Engineering & Systemshttps://computerjournals.stmjournals.in/index.php/JoCES/article/view/310Use of Information and Communication Technology| by Medical Students: A Study of Central Library of CUSMCH2020-05-16T08:02:22+00:00Shamajibhai D. Parmarshamji170@gmail.comShishirkumar H. Mandaliashamji170@gmail.com<p align="center"><strong><em>Abstract</em></strong></p><p><em>The use of information and communication technology (ICT) has become most influential and swift segment in library and information services. This study outlines the use of ICT by medical students and find out the significance of latest technology in central library. Presently, uses of electronic media and technologies are</em><em> increased notably in healthcare profession, education and research. Medical students are often using ICT for an access to the library resources and online databases. In this </em><em>study determine the requirements and use of the various tools and technique of ICT by healthcare students. Throughout, the study makes an effort to examine the use of ICT service by medical students at central library of C.U.Shah Medical College and Hospital, Gujarat. In this research apply different parameters like the purpose and frequency of visit, </em><em>internet access and use of e-resource,</em><em> attitude of medical students towards ICT, use of ICT for </em><em>access resources,</em><em> effectiveness of ICT on medical education and research, </em><em>impact of ICT on library services and view related to its troubles and level of satisfaction of usage of ICT.</em></p><p><em> </em></p><p><strong><em>Keywords</em></strong><em>: </em><em>Information t</em><em>echnology,</em><em> communication technology, electronic technology, ICT, internet, </em><em>library services, online access, healthcare professional, </em><em>medical students, </em><em>CUSMCH, Gujarat.</em></p>2019-04-01T06:37:55+00:00Copyright (c) 2019 Journal of Communication Engineering & Systemshttps://computerjournals.stmjournals.in/index.php/JoCES/article/view/309Analysis of Fractal based Nested Geometries Built on Design Configurations2020-05-16T08:01:51+00:00Sejal Kundaliasejalkundalia.8@gmail.comVivek Unadkatsejalkundalia.8@gmail.comSurabhi Dwivedisejalkundalia.8@gmail.com<p align="center"><strong><em>Abstract</em></strong></p><p><em>Fractal antenna based on the nested geometries are proposed and designed in this letter. The paper depicts the design optimization of the nested geometries for multi-rate characteristics. The antenna is fed by waveguide port. The design is obtained at the center frequency 3.5 GHz. Moreover the effect various nested elements have been observed in the geometry. The modification in geometry is introduced using pentagonal elements of the patch. The enhancement in the operating bands is observed by above geometry. Operating frequency bands are adjusted by variations in design parameters. Multiband functionality is observed in all the designs presented in this paper. By alterations in the geometry of this antenna various operating frequencies are achieved which are applicable to more than one applications. Gain and Directivity are stabilized to large extent. Improvement in the return loss is observed .These antenna designs are thoroughly simulated on FR-4 substrate with loss tangent 0.025 and dielectric constant 4.3 and analyzed using Computer Simulation Technology Microwave Studio. This antennas find applications in GPS and Wi-max.</em></p><p><em> </em></p><p><strong><em>Keywords:</em></strong><em> Fractal antenna, nested geometry, multiband applications</em></p>2019-04-01T06:29:31+00:00Copyright (c) 2019 Journal of Communication Engineering & Systemshttps://computerjournals.stmjournals.in/index.php/JoCES/article/view/308Analysis and Application of Cognitive Radio on 4G Communications2020-05-16T08:01:28+00:00Md.Nazrul Hossain Islamalamgirlovely@yahoo.comMohammad Mamunur Rashidalamgirlovely@yahoo.comA.O.M. Asaduzzamanalamgirlovely@yahoo.comMd. Shamim Hossainalamgirlovely@yahoo.comMd. Alamgir Hossainalamgirlovely@yahoo.com<p align="center"><strong><em>Abstract</em></strong></p><p><em>Nowadays network services are available anywhere and anytime through the advancement in wireless communication technology. Several technology and generation are introduced for wireless communication such as 2.5G, 3G etc. But for faster and reliable communication wireless generations are improved—4G technology is one of them. 4G communication systems are being developed to solve the various problems faced by the current communication systems (3G, 2.5G). 4G will be an intelligent technology that will reduce the number of different technologies to a single global standard. Cognitive Radio (CR) is the key enabling technology for next generation networks. CR techniques provide the capability to use or share the spectrum in an opportunistic manner. With the use of CR, 4G wireless networks will support global roaming across multiple wireless and mobile networks. In this paper, analysis and application of CR in 4G communications is reviewed. IEEE 802.22 networks are cognitive technology-based networks which will enhance the performance of 4G communication systems. IEEE 802.16h (WiMAX) provides extensions to support unlicensed coexistence.</em></p><p><em> </em></p><p><strong><em>Keywords:</em></strong><em> Cognitive Radio (CR), WiMAX, Fourth Generation (4G), Federal Communications Commission (FCC), Cognitive Engine (CE)</em></p>2019-04-01T06:17:09+00:00Copyright (c) 2019 Journal of Communication Engineering & Systemshttps://computerjournals.stmjournals.in/index.php/JoCES/article/view/307Relative Performance of BPSK and BFSK in Underground Mine Communication Considering Multipath and Bending Losses2020-05-16T08:01:05+00:00M. N. Jayarammelkotejayaram@yahoo.comC. R. Venugopalmelkotejayaram@yahoo.com<p align="center"><strong><em>Abstract</em></strong><em></em></p><p><em>Wireless/Mobile signals get strongly attenuated deep inside a building/tunnel/mine. In order to study the performance parameters, underground communication channel needs to be modeled. As a first step here we have practically tried two digital modulation methods BPSK and BFSK for underground communication. Wireless link was able to support data signals. Various measurements were made up to a depth of 30 m inside the mine. Beyond 30 m as more than 75% of the received signal was attenuated measurements was not possible. Received signal strength, power line noise effects are measured. SNR, E<sub>b</sub>/N<sub>o</sub>, P<sub>e </sub>(Probability error), penetration loss multi path, and bending loss are calculated up to 30 m depth. Using these results channel modeling can be done. For the measured data we are trying to fit empirical equations.</em></p><p><em> </em></p><p><strong><em>Keywords</em></strong><em>: Mine communication, BPSK, BFSK</em></p>2019-04-01T06:05:13+00:00Copyright (c) 2019 Journal of Communication Engineering & Systemshttps://computerjournals.stmjournals.in/index.php/JoCES/article/view/306Implementation of Direct Sequence Spread Spectrum using MATLAB2020-05-16T08:00:29+00:00Nithyashree S.nithyashree.26@gmail.comKarthik S.nithyashree.26@gmail.com<p align="center"><strong><em>Abstract</em></strong></p><p><em>A major concern in the design of communication system is to provide secure communication. The system may be required to provide a form of secure communication in a hostile environment such that transmitted signal is not easily detected or recognized by unwanted listeners. This requirement is fulfilled by signaling techniques known collectively as spread spectrum modulation. The main advantage of spread spectrum communication system is its ability to reject interference whether it is the unintentional interference or intentional interference of another user simultaneously attempting to transmit through the channel or hostile transmitter attempting to jam the transmission. The spread spectrum signals are used for suppressing the effects of interference due to jamming, interference arising from other users of the channel and self-interference due to multipath propagation. Hiding the signal by transmitting to low power and thus making it difficult for an unintended listener to detect in the presence of background noise. Achieving messaging privacy in the presence of other listeners.</em></p><p><em> </em></p><p><strong><em>Keywords:</em></strong><em> Spreading, despreading, direct sequence spread spectrum</em></p>2019-04-01T05:50:18+00:00Copyright (c) 2019 Journal of Communication Engineering & Systemshttps://computerjournals.stmjournals.in/index.php/JoCES/article/view/305Implementation of Compression and Decompression using LZW Algorithm2020-05-16T07:59:26+00:00Nithyashree S.nithyashree.26@gmail.comKarthik S.nithyashree.26@gmail.com<p align="center"><strong><em>Abstract</em></strong><em></em></p><p><em>Many compression techniques are used to minimize the amount of memory that is to be used to store the data. One such compression technique is by using LZW algorithm. The purpose of this is to present a data compression and decompression software to reduce the amount of memory used for storing data. By using data compression, stream of symbols is transformed into codes. For effective compression, the resultant stream of codes will be smaller than the original symbol. </em><em>LZW is a "dictionary"-based compression algorithm. Here, to encode a substring, only a single code number is used, corresponding to the substring's index in the dictionary, which will be written to the output file. LZW algorithm finds its application in data compression and performs best on files with repeated substrings, such as text files.</em></p><p><em> </em></p><p><strong><em>Keywords: </em></strong><em>LZW, compression, decompression, index, string</em></p>2019-04-01T04:59:10+00:00Copyright (c) 2019 Journal of Communication Engineering & Systemshttps://computerjournals.stmjournals.in/index.php/JoCES/article/view/302Incorporating Mobility to Sensor Networks during Node Failure and Their Analysis for Radio Propagation Models2019-03-30T11:14:52+00:00S. Kiruthikakirthika.srinivasan@gmail.comS. Vadivelkirthika.srinivasan@gmail.com<p><strong><em>Abstract</em></strong></p><p><em>Wireless sensor networks are expected to find wide applicability and increasing deployment in the near future. It consists of spatially distributed autonomous sensors to monitor physical or environmental conditions and to cooperatively pass their data through the network to a main location. The more modern networks are bi-directional, also enabling control of sensor activity. The development of wireless sensor networks was motivated by military applications such as battlefield surveillance, many industrial and consumer applications, such as industrial process monitoring and control, machine health monitoring, and so on. </em><em>The operation of WSN is normal under ordinary conditions. But in case of an emergency situation, like fire breakout, one of the nodes deployed in the area may get ruined. Under such circumstances, the data collected around the vicinity of the node may be lost. Such kinds of situations result in severe packet drop and thus decrease the communication throughput in medium access control (MAC) protocols. Hence, data aggregation and mobility has been put forward as an essential paradigm. In this paper, an alternative mechanism for node failure and a recovery scheme for the vast packet drop problem has been proposed. Here reference point group mobility model has been used for replacing the damaged node and the aftermath performances are analyzed for various radio propagation models. The simulation is carried out by means of NS2 (network simulator).</em><em> </em><em></em></p><p class="IndexTerms"><em> </em></p><p class="IndexTerms"><strong><em>Keywords</em><em>: </em></strong>Autonomous sensors, wireless sensor networks, data aggregation technique, emergency, transmission</p>2019-03-30T11:13:46+00:00Copyright (c) 2019 Journal of Communication Engineering & Systemshttps://computerjournals.stmjournals.in/index.php/JoCES/article/view/301Improvement of BER in Wavelet Transform-based OFDM System with Kalman Filter2019-03-30T11:14:08+00:00Sajjan Singhsajjantech@gmail.comPardeep Kumarsajjantech@gmail.comSVAV Prasadsajjantech@gmail.com<p class="IEEEAbtract" align="center"><strong>Abstract</strong><em></em></p><p class="IEEEAbtract"><em>We know that bandwidth is the most precious commodity in all communication systems such as 2G, 3G and 4G. Each service provider is now searching how to accommodate a large number of users within a limited allocated bandwidth, In order to increase the data rate of wireless medium with higher performance, orthogonal frequency division multiplexing (OFDM) is chosen. In this paper, the bit error rate analysis (BER) of discrete wavelet transform (DWT)-OFDM system is compared with conventional fast Fourier transform (FFT)-OFDM system in order to ensure that wavelet transform-based OFDM transmission gives better improvement to combat ICI than FFT-based OFDM transmission and hence improvement in BER</em><em>. Wavelet transform is applied together with OFDM technology in order to improve performance. In the proposed system, the authors are using Kalman filter in order to improve BER by minimizing the effect of ICI and noise. </em><em>Obtained results from proposed system simulation showed acceptable BER performance at low SNR</em><em>.</em></p><p> </p><p><strong>Keywords<em>:</em></strong><em> </em><em>OFDM, discrete wavelet transform, fast fourier transform, DWT based OFDM, FFT based OFDM, BER, kalman filter</em><em></em></p>2019-03-30T11:05:44+00:00Copyright (c) 2019 Journal of Communication Engineering & Systemshttps://computerjournals.stmjournals.in/index.php/JoCES/article/view/300GSM based Multiuser E-Notice Board using Wireless Technology2019-03-30T11:14:08+00:00Gopika Sgopikasuku@gmail.comKiruthika MRgopikasuku@gmail.comAyswaria Dgopikasuku@gmail.com<p align="center"><strong><em>Abstract</em></strong></p><p><em>Wireless technology is now taking over the entire world. It has helped in shrinking the world. GSM technology is the most popular wireless technology which is now fastest growing technology in the electronic industry. Advancement in technology has brought about digitization to the core. Even the billing system, attendance system, health monitoring, etc., have all got digitized and so are the advertisement boards and the announcement boards. The existing system is based on programmed display boards. It displays a single message which can be reprogrammed to display another message. This paper explains about the announcement system using the GSM technology using which we can display any message from any part of the world irrespective of the number of messages. This announcement system uses a scrolling LED display which replaces the existing LCD based announcement systems.</em></p><p><em> </em></p><p><strong><em>Keywords: </em></strong><em>GSM, SIM, AT commands, microcontroller, shift register, MAX 232, LED, flash, EPROM, RAM, PCB design, CMOS, timers, counters</em></p>2019-03-30T10:47:55+00:00Copyright (c) 2019 Journal of Communication Engineering & Systemshttps://computerjournals.stmjournals.in/index.php/JoCES/article/view/299Compare Three Reactive Routing Protocols in Grid based Cluster Wireless Sensor Network using Qualnet Simulator2019-03-30T11:14:08+00:00Pratibha Kevrepratibhakevre@yahoo.co.inLaxmi Shrivastavapratibhakevre@yahoo.co.in<p align="center"><strong><em>Abstract</em></strong></p><p><em>This</em><em> paper is comparing the performance of three different routing protocols in grid based clustering for wireless sensor network. Sensor network is keeping limited energy of sensor node send limited battery power. However the main task of sensor network energy consumption for sensor nodes. Furthermore grid based sensor working depend on location based that is divided into different parts. In grid based wireless sensor network, cluster head it works like a base station. Cluster zones are collecting all information that is passing through sensor nodes. In this paper, three routing protocols AODV ( Ad-hoc on demand distance vector routing), DYMO (Dynamic Manet on demand routing ) and DSR (Dynamic source routing) are analyzed and compared by using Qualnet simulator on the basis of performance metrics such as energy consumption in transmit mode, receive mode, idle mode, and residual battery capacity.</em></p><p><strong><em> </em></strong></p><p><strong><em>Keywords</em></strong><em>: Wireless sensor network, IEEE 802.15.4, routing protocols (AODV, DYMO, DSR), qualnet 5.2 simulator, CBR.</em></p>2019-03-30T10:37:02+00:00Copyright (c) 2019 Journal of Communication Engineering & Systemshttps://computerjournals.stmjournals.in/index.php/JoCES/article/view/298Comparative Analysis of Digital Image Watermarking using DCT and DWT2019-03-30T11:14:08+00:00Rushit K. Chokashirushitc98@yahoo.co.inG. D. Makwanarushitc98@yahoo.co.in<p><strong><em>Abstract</em></strong></p><p><em>Watermarking is a technique to hide information into digital data and provides security against intentional and unintentional attack. It is a very important and emerging field which helps to protect ownership of digital information. Watermarking is the process of inserting or hiding information behind cover data. In this paper we discussed about two digital watermarking techniques, Discrete Cosine Transform (DCT) and discrete wavelet Transform (DWT). The parameters to test robustness and transparency of the watermarking are Peak signal to Noise Ratio (PSNR), Mean Square Error (MSE) and Normalized correlation coefficient. Also, robustness of watermarking is necessary so we tested for various attacks including Gaussian noise, salt and pepper noise, rotation and filtering. The experiment result shows that the frequency domain method is more robust against different kinds of attacks and the watermarked image has good transparency. Both techniques are implemented and result analysis has been observed.</em><em> </em></p><p><strong><em>Keywords</em></strong><strong><em>:</em></strong><em> Digital image watermarking, wavelet transform, discrete cosine transform, peak signal to noise ratio</em></p>2019-03-30T10:22:42+00:00Copyright (c) 2019 Journal of Communication Engineering & Systemshttps://computerjournals.stmjournals.in/index.php/JoCES/article/view/297Design and Analysis of I-Slotted Rectangular Microstrip Patch Antenna for Wireless Application2019-03-30T09:56:46+00:00Kuldeep Kumar Parasharkuldeep.parashar10@gmail.com<p class="Default" align="center"><strong><em>Abstract</em></strong><strong><em></em></strong></p><p class="Default"><em>This paper presents a novel design of an I-slotted patch antenna with compact nature and the study of various antenna parameters. The antenna is fed by the inset-feeding technique. The proposed patch antenna is designed and simulated on IE3D simulation software (Zeland program manager 9.0)</em><em>. The main aim of the proposed work is to design a large-bandwidth antenna with compact size.</em><em> The proposed microstrip antenna has a wide bandwidth covering the range from 1.444–2.393 GHz. By using simple the inset-feed technique and by introducing I-slotted wide bandwidth of 49.46%,</em><em> high gain 5dBi and good radiation efficiency of about 99% has been achieved. </em></p><p class="Default"><strong><em> </em></strong></p><p class="Default"><strong><em>Keywords:</em></strong> <em>Rectangular microstrip patch antenna (RMPA), I-shaped,<strong></strong>inset feed, wideband and compact patch</em></p>2019-03-30T09:53:50+00:00Copyright (c) 2019 Journal of Communication Engineering & Systemshttps://computerjournals.stmjournals.in/index.php/JoCES/article/view/296Optimized Performance Characteristics of a 450 nm Semiconductor Laser by Varying Differential Gain2019-03-30T09:56:46+00:00Sayed Muhammad Bakerbakerbappy@gmail.comRinku Basakbakerbappy@gmail.com<p align="center"><strong><em>Abstract</em></strong></p><p><em>In this work, the effects on the performance characteristics of a </em> <em>true-blue </em> <em> 3QW separate confinement heterostrcture edge-emitting laser are presented by varying differential gain. At the temperature of 300 K, the threshold current of the laser is</em> <em>. The peak material gain for the designed laser is obtained as</em> <em> and further used for the analysis of the performance characteristics of the designed double-heterostructure laser for the variation of differential gain. From the performance analysis, the maximum allowable differential gain is</em> <em> above which the steady state carrier density falls below the threshold level where lasing mechanism does not sustain. At this optimized value of differential gain, the maximum output power of the laser is</em> <em>, the maximum resonance frequency is</em> <em> and the corresponding modulation bandwidth is</em> <em> for the injection current of </em> <em> at the temperature of 300 K.</em></p><p><strong><em> </em></strong></p><p><strong><em>Keywords: </em></strong><em>True blue laser, MQW, output power, resonance frequency, modulation bandwidth, differential gain</em></p>2019-03-30T09:48:26+00:00Copyright (c) 2019 Journal of Communication Engineering & Systemshttps://computerjournals.stmjournals.in/index.php/JoCES/article/view/295Computation of Electromagnetic Energy Flux Due to various Distributions of Oscillating Electric Dipoles2019-03-30T09:56:46+00:00Sudipto Roymajumdar_priyadarshi@yahoo.comPriyadarshi Majumdarmajumdar_priyadarshi@yahoo.comMelbin Varghesemajumdar_priyadarshi@yahoo.comSoumita Mondalmajumdar_priyadarshi@yahoo.comDebanjan Mookherjeemajumdar_priyadarshi@yahoo.comAnubhav Tirkeymajumdar_priyadarshi@yahoo.com<p align="center"><strong><em>Abstract</em></strong></p><p><em>The authors have discussed about the effects of cell phone radiations, its applications along with its adverse effects. In this work we have computed the energy flux received at some specified point (say the human head) due to some simple distributions of dipoles by computing the relevant electric, magnetic fields and finally the Poynting vector. We have shown that although for a symmetric distribution of emitters the energy flux vanishes at the center (which is most unlikely to happen in reality) but certainly for an asymmetric distribution (which is more closure to reality) we may have some resultant energy flux. We have defined a new parameter enhancement ratio and have plotted it with other system parameters relating to the generalized positions of two dipole emitters.</em></p><p> </p><p><strong><em>Keywords: </em></strong><em>cell phone radiation, oscillating dipole, Poynting vector, <br /> enhancement ratio</em></p>2019-03-30T09:42:51+00:00Copyright (c) 2019 Journal of Communication Engineering & Systemshttps://computerjournals.stmjournals.in/index.php/JoCES/article/view/294Block SLM Scheme for Efficient PAPR Reduction in OFDM Systems2019-03-30T09:56:46+00:00Brajesh Chandra Anuragianuragi.brajesh@gmail.comSarita Singh Bhadauriaanuragi.brajesh@gmail.com<p><strong style="text-align: center;"><em><span style="font-size: 12.0pt; font-family: 'Times New Roman',serif;">Abstract</span></em></strong></p><p><strong style="text-align: center;"><em></em></strong><em style="text-align: justify;"><span style="font-size: 10.5pt; font-family: 'Times New Roman',serif;">Orthogonal frequency division multiplexing (OFDM) is an attractive technique due to its high-speed data transmission and robustness for time-selective channels. However, the major drawback of OFDM system is high peak-to-average power ratio (PAPR). In this paper, two PAPR reduction schemes have been introduced; one is conventional selected mapping (SLM) scheme and a new proposed block selected mapping (BSLM) scheme to obtain PAPR reduction performance in OFDM system. In the proposed BSLM scheme, OFDM symbol sequence was partitioned into several blocks and then each block sequence was multiplied with various phase-rotation sequences for generating alternative signals as candidates and then the one with the lowest PAPR was selected for actual transmission. Simulation result shows that proposed BSLM scheme provides a better PAPR reduction performance as compared to conventional SLM scheme, and it is also observed that by increasing the partition of blocks, large PAPR reduction can be obtained.</span></em></p><p><strong><em><span style="font-family: 'Times New Roman',serif;">K<span style="letter-spacing: -.05pt;">ey</span>words:</span></em><em style="text-align: justify;"></em></strong><em style="text-align: justify;"><span style="font-family: 'Times New Roman',serif;">OFDM, orthogonal frequency division multiplexing, PAPR, peak-to-average power ratio, SLM, selected mapping, BSLM, block selected mapping, CCDF, complementary cumulative distribution function</span></em></p><p class="MsoNormal" style="margin-bottom: .0001pt; text-align: center; line-height: normal;" align="center"> </p>2019-03-30T09:27:57+00:00Copyright (c) 2019 Journal of Communication Engineering & Systemshttps://computerjournals.stmjournals.in/index.php/JoCES/article/view/293A Multi-Hop Power Adaptive MAC Protocol using Fuzzy Logic for Wireless Networks2019-03-30T09:56:46+00:00S. L. Prathapa Reddyslpreddy@gmail.comM. V. Subramanyamslpreddy@gmail.comK. Satyaprasadslpreddy@gmail.com<p align="center"><strong><em>Abstract</em></strong></p><p><em>Power-based connectivity is a recent research topic in ad hoc networks. Implementing power control mechanisms is essential to enhance the lifetime of the network, and also to improve the throughput, find cost-effective routes and spatial reuse. In this paper, MAC protocol is used for implementing coordination functions and power-control mechanisms using fuzzy rules. Fuzzy rules are generated by upper layers of the network layer using two input variables such as link quality and node-neighborhood count, and optimal power-consumption level as the output variable. Experimental results using fuzzy rules are compared with DSR routing and simple two-hop power control methods. Results showed that two-hop power control with fuzzy-logic method yields lower route discovery time, increased cache replies, minimum simulation time and end-to-end delay when compared to DSR routing and two-hop routing protocol.</em></p><p><strong><em> </em></strong></p><p><strong><em>Keywords: </em></strong><em>Power control, medium access control (MAC), energy saving, fuzzy logic, ad hoc networks</em></p>2019-03-30T09:19:33+00:00Copyright (c) 2019 Journal of Communication Engineering & Systemshttps://computerjournals.stmjournals.in/index.php/JoCES/article/view/292Reformation of WLAN Feeler by Incorporating Varactor Diode with Negative Media Structure2019-03-30T08:57:35+00:00Bimal Gargr.pratap7872@gmail.comRanjeet Pratap Singh Bhadoriyar.pratap7872@gmail.com<p align="center"><strong><em>Abstract</em></strong></p><p><em>In this manuscript, authors proposed a negative media structure with Varactor diode to reform the rectangular microstrip patch antenna parameter to a great extent. Initially basic feeler was designed and simulated, and then parameters were enhanced by implementing negative media structure. It has been observed that negative media is not sufficient to improve the parameters therefore Varactor diode was introduced to get the required improvement. This proposed design of feeler was designed for L band, where operating frequency was 2 GHz. Varactor diode used in this design process was Silicon Diffused Junction Type Varactor Diode (SVC704). Return loss reduced from –11.57 to –35.97 dB, bandwidth increased from 26 to 54.6 MHz i.e., 110%. Efficiency also modified from 43.5 to 78.2%. </em></p><p> </p><p><strong><em>Keyword</em></strong>: <em>Varactor diode, negative media (metamaterial), permittivity, permeability, bandwidth</em></p>2019-03-30T08:56:56+00:00Copyright (c) 2019 Journal of Communication Engineering & Systemshttps://computerjournals.stmjournals.in/index.php/JoCES/article/view/291Performance Analysis of FIR Digital Filter using Artificial Neural Network for ECG Signal2019-03-30T08:57:12+00:00Ravikant Prajapatiravikant672@gmail.comR. P. Narwariaravikant672@gmail.com<p><strong><em>Abstract</em></strong></p><p><em>In performance of electrocardiography (ECG) signal, signal acquisition must be noise free. This paper deals with the application of the digital finite impulse response (FIR) filter on the raw ECG signal. In this paper different window techniques used to design FIR filter and their signal to noise ratio are compared. The dataset configured for multilayer perceptron (MLP) training with feed forward algorithm. Finally the MLP is trained and the results of signal to noise ratio are shown.</em></p><p> </p><p><strong><em>Keywords:</em></strong> <em>Finite impulse response (FIR), signal to noise ratio (SNR), dataset, <br /> multilayer perceptron</em></p><p><strong><em> </em></strong></p>2019-03-30T08:48:08+00:00Copyright (c) 2019 Journal of Communication Engineering & Systemshttps://computerjournals.stmjournals.in/index.php/JoCES/article/view/290Direction of Arrival Estimation in Mobile Communication Systems using MUSIC Algorithm2019-03-30T08:57:12+00:00Amjad Abu Jazaramjad.jazar@aauj.eduMohammed Abukhamiesamjad.jazar@aauj.eduMiqdad Khalielamjad.jazar@aauj.eduJihad Khalafamjad.jazar@aauj.edu<p align="center"><strong><em>Abstract</em></strong></p><p><em>Adaptive antenna arrays use multiple antenna elements to form directional patterns in order to improve the performance of wireless communication systems. The antenna arrays also have the ability to estimate the Direction-of-Arrival (DoA) of the signals received from the desired transmitters as well as the directions of interference signals. The results of DoA estimation are then used to adjust the weights of the adaptive Multi-Input Multi-Output (MIMO) antenna so that the radiated power is maximized towards the desired users, and radiation nulls are placed in the directions of interference signals. A popular technique used to estimate the DoA is the Multiple Signal Classification (MUSIC) algorithm. The MUSIC algorithm arranges the signal into its covariance matrix, and then performs an Eigen decomposition process to produce the signal and noise subspace and then obtain the DoA by searching the subspace. We designed a MIMO wireless communication system, and developed computer simulation programs using Matlab to evaluate the DoA using the MUSIC algorithm, then to compare between using linear array and circular array, and to make a comparison between using linear array, and circular array.</em></p><p> </p><p><strong><em>Keywords:</em></strong> <em>DoA, MIMO, MUSIC, linear array, circular array </em></p>2019-03-30T08:39:33+00:00Copyright (c) 2019 Journal of Communication Engineering & Systemshttps://computerjournals.stmjournals.in/index.php/JoCES/article/view/289Design of Ultra Wideband Square Aperture Shaped Microstrip (ASM) Antenna2019-03-30T08:57:12+00:00Yashwant Kumar Soniyash.swarnkar@gmail.comNavneet Kumar Agrawalyash.swarnkar@gmail.com<p align="center"><strong><em>Abstract</em></strong></p><p><em>A compact coplanar waveguide-fed (CPW) microstrip antenna for ultra-wideband (UWB) wireless communication is presented. The antenna comprises a square aperture (24 mm × 24 mm) etched on the ground-plane of a printed circuit board and a modified rectangular shaped stub, also total size of the antenna is 30 mm × 30 mm. The lower edge of the band is attained by properly decoupling the resonant frequencies due to proper selection of dimension of rectangular stub of the antenna. The upper edge of the radiating band is enhanced by cutting slots in rectangular stub. Execution results show that the designed antenna operates in the 2.8 to 13.7 GHz band with S11 ≤ -10 dB. The antenna exhibits broadband impedance matching with stable and omnidirectional radiation pattern over the entire operating band.</em></p><p> </p><p><strong><em>Keywords:</em></strong><strong><em> </em></strong><em>Coplanar waveguide, microstrip antennas, ultra-wideband antennas</em></p>2019-03-30T08:29:35+00:00Copyright (c) 2019 Journal of Communication Engineering & Systemshttps://computerjournals.stmjournals.in/index.php/JoCES/article/view/288Compact Printed Coplanar Waveguide-fed UWB/Bluetooth Integrated Antenna for Wireless Personal Area Network Communication2019-03-30T08:57:12+00:00Yashwant Kumar Soniyash.swarnkar@gmail.comNavneet Kumar Agrawalyash.swarnkar@gmail.com<p align="center"><strong><em>Abstract</em></strong></p><p><em>A compact integrated Bluetooth and ultra-wideband (UWB) coplanar waveguide (CPW)-fed antenna is presented and discussed. In this paper, the designed antenna has got specialty having wide coverage of Bluetooth and UWB frequency band both successfully giving optimum performance and above all small size. It has been designed very compact retaining all the standard parameters like VSWR, radiation pattern and gain to the acceptable level. The integrated dual-band antenna covering 2.4–2.484 GHz (Bluetooth) and 3.1–10.6 GHz (UWB) frequency band is designed using ANSOFT HFSS software by creating a quarter-wavelength C-shaped Bluetooth element near the radiating plane. The antenna has a small size (26 × 20 mm2), and shows acceptable gain flatness with stable omnidirectional radiation patterns across the integrated Bluetooth and UWB bands.</em></p><p><strong><em> </em></strong></p><p><strong><em>Keywords:</em></strong><strong><em> </em></strong><em>CPW feed, bluetooth, integrated antenna, ultra-wideband</em></p>2019-03-30T07:31:16+00:00Copyright (c) 2019 Journal of Communication Engineering & Systemshttps://computerjournals.stmjournals.in/index.php/JoCES/article/view/287Calculating SAR Distribution and RF Electromagnetic Field Due To MRI Coil at Human Model2019-03-30T08:57:12+00:00Namrata Agrawalnamita.mits@yahoo.comP. K. Singhalnamita.mits@yahoo.com<p align="center"><strong><em>Abstract</em></strong></p><p><em>MRI (magnetic resonance imaging) is an effective method for diagnosis of diseases. The MRI system is made of some important units including RF (radio frequency) devices [1]. The RF coil is one of the important parts in the RF unit. During the imaging, the RF coil radiates EM (electromagnetic) pulse to the human body and in response receives the NMR (nuclear magnetic resonance) signals emitted from the nuclei, which constitutes the human body. Therefore, it is necessary to estimate the SAR (specific absorption rate) in the human body due to the radiated EM energy from the MRI coils. However, in recent years, MR imaging is used not only for the head but also for other parts of the body. Especially, in this study, the SAR distributions in the head and abdomen of a human model are investigated. Electric and magnetic field distribution also seen around the human model.<strong></strong></em></p><p><strong> </strong></p><p><strong><em>Keywords:</em></strong><em> electromagnetic field, FDTD (finite difference time domain method), human model, MRI coil, SAR (specific absorption rate)</em></p>2019-03-30T07:26:14+00:00Copyright (c) 2019 Journal of Communication Engineering & Systemshttps://computerjournals.stmjournals.in/index.php/JoCES/article/view/286Rectenna Design with Defect Ground Structure at 2.16 GHz2019-03-30T06:58:43+00:00Shailendra Singh Ojhashailu_jnv@rediffmail.comP. K. Singhalshailu_jnv@rediffmail.comAnshul Agarawalshailu_jnv@rediffmail.comAkhilesh Guptashailu_jnv@rediffmail.com<p align="center"><strong><em>Abstract</em></strong></p><p><em>This paper presents the rectenna design for Wireless Power Transmission. The design would receive and convert microwave of 2.16 GHz to DC. Proposed rectenna is a combination of microstrip patch antenna, followed by stepped impedance filter and then matching circuit and rectifier circuit. A low-pass filter (LPF) at the input port of the rectifying circuit is used to suppress the high order harmonics. The IE3D software is used for the simulation of this structure.</em></p><p><em> </em></p><p><strong><em>Keywords:</em></strong><em> defect ground structure (DGS),wireless microwave power transmission (WMPT), rectagular microstrip patch antenna(RMPA), rectenna, wireless power transmission(WPT), low pass filter (LPF), IE3D software.</em></p>2019-03-30T06:57:36+00:00Copyright (c) 2019 Journal of Communication Engineering & Systemshttps://computerjournals.stmjournals.in/index.php/JoCES/article/view/285Analysis of Parabolically versus Exponentially Tapered Inbuilt Chip-to-Fiber Butt Coupler2019-03-30T06:58:07+00:00Santosh Kumarsantoshrus@ismu.ac.inS. K. Raghuwanshisantoshrus@ismu.ac.inAjay Kumarsantoshrus@ismu.ac.in<p class="Abstract" align="center"><strong><em>Abstract</em></strong></p><p class="Abstract"><em>The finite difference beam propagating method (BPM) is one of the most powerful technique to investigate linear and nonlinear lightwave propagation phenomena in axially varying waveguides such as curvilinear directional couplers, branching and combining waveguides, S-shaped bend waveguides, and different types of tapered waveguides. BPM is also quite important for the analysis of ultra short light pulse propagation in optical fibers. To date numerous algorithms for BPM have been proposed and successfully applied to a very wide class of dielectric optical waveguide structures. </em><em>A parabolically and an exponentially tapered structure is introduced into the chip-to-fiber butt coupler. The butt couplers are fabricated with the InP - InGaAsP waveguide. In this paper, a comparison is being carried out between the both proposed structure and it is observed from our study, that there is a more substantial loss in parabolically tapered structure as compared to the exponentially tapered structure. The working principle of parabolically tapered structure is similar to that of exponentially tapered structure, so authors can substitute parabolically tapered structure with exponentially tapered one. During the course end of this paper, the excess loss of the proposed structure is compared. </em></p><p class="keywords"> </p><p class="keywords"><strong>Keywords:</strong> linear waveguide; linear taper waveguide; parabolic taper waveguide; beam propagation method</p>2019-03-30T06:48:23+00:00Copyright (c) 2019 Journal of Communication Engineering & Systemshttps://computerjournals.stmjournals.in/index.php/JoCES/article/view/284Amelioration of Parameters of Antenna using Metamaterial with Negative µ and ε for WLAN2019-03-30T06:58:07+00:00Bimal Gargbimalgarg@yahoo.comAnupam Dasbimalgarg@yahoo.com<p><strong><em>Abstract</em></strong></p><p><em>In this paper, a Rectangular Microstrip Patch Antenna with “Multi Discoidal Rings” shaped metamaterial cover is designed and replicate at a height of 3.276mm from the ground plane. The antenna along with the proposed metamaterial cover is designed to resonate at 3.36 GHz frequency (in S-Band). Proposed metamaterial cover significantly reduces the return loss and increases the bandwidth and efficiency of the antenna in comparison to rectangular microstrip patch antenna alone. The proposed antenna is suitable for application of WLAN requiring 108 MHz bandwidth space and reduced return loss, at 3.36 GHz frequency of about –45.66 dB and its efficiency increases by 51.19% (approx 34.88%).The scope of this paper is to design and simulate the proposed artificial structure with simultaneous negative permittivity and permeability or the so-called Left Handed Metamaterial. Nicolson–Ross–Weir approach has been used for verifying the double-negative properties of the proposed metamaterial.</em></p><p><strong><em> </em></strong></p><p><strong><em>Keywords:</em></strong><strong> </strong><em>rectangular microstrip patch antenna (RMPA), double negative left-handed metamaterial, return loss(LH-MTM), Nicolson–ross–weir (NRW</em><strong>)</strong></p>2019-03-30T06:41:07+00:00Copyright (c) 2019 Journal of Communication Engineering & Systemshttps://computerjournals.stmjournals.in/index.php/JoCES/article/view/283A Planar Monopole Antenna for L-Band Applications2019-03-30T06:58:06+00:00Anshul Agarwalagarwal.2712@gmail.comP. K. Singhalagarwal.2712@gmail.comShailendra Singh Ojhaagarwal.2712@gmail.comAkhilesh Kumar Guptaagarwal.2712@gmail.com<p align="center"><strong><em>Abstract</em></strong></p><p><em>This paper presents a square monopole antenna for L-band application, it is designed to be used in a 879 MHz–2113 MHz frequency bands. It is printed on dielectric substrate of FR4 glass epoxy with relative permittivity (ɛ<sub>r</sub>) of 4.3, thickness of 1.6 mm, a square monopole antenna (aluminium sheet) is mounted on half ground plane via a single feeding strip. Prototypes of these configurations were manufactured and measured in frequency range 0–2.5 GHz. Experimental and simulation results is calculated using computer simulation technology (CST).</em></p><p><strong><em> </em></strong></p><p><strong><em>Keywords:</em></strong><em> square monopole antenna, wideband monopole antenna, L-band monopole antenna</em></p>2019-03-30T06:29:06+00:00Copyright (c) 2019 Journal of Communication Engineering & Systemshttps://computerjournals.stmjournals.in/index.php/JoCES/article/view/282Review of Adaptive Modulation Recognition Techniques2019-03-30T06:13:02+00:00Akash I. Mecwanakash.mecwan@nirmauni.ac.inPiyush M. Bhatasanaakash.mecwan@nirmauni.ac.inVijay G. Savaniakash.mecwan@nirmauni.ac.in<p align="center"><strong>ABSTRACT</strong></p><p align="center"> </p><p><em>Rising development in software defined radio (SDR) systems has led to rapid development in adaptive modulation recognition (AMR) techniques. </em><em>Different order modulations combined with different coding schemes allow sending more bits per symbol, thus achieving higher throughputs and better spectral efficiencies by the use of AMR.</em><em> </em><em>The aim of this paper is to study various AMR techniques and compare their advantages and disadvantages to find the most efficient and feasible technique. In the techniques studied, various modulation schemes like M-PSK, GMSK, M-FSK, M-QAM, etc., are capable of being recognized and subsequently demodulated if required.</em></p><p><strong><em> </em></strong></p><p><strong><em>Keywords:</em></strong><em> </em><em>Software defined radio (SDR), adaptive modulation and recognition (AMR)<strong></strong></em></p>2019-03-30T06:10:12+00:00Copyright (c) 2019 Journal of Communication Engineering & Systemshttps://computerjournals.stmjournals.in/index.php/JoCES/article/view/281Proposal to Use Cartography for Predicting the Urbanization as an Aid to Communication Network Planners2019-03-30T05:19:38+00:00Biswajeet Mukherjeebiswajeet.26@gmail.com<p align="center"><strong>ABSTRACT</strong></p><p align="center"><strong><em> </em></strong></p><p><em>In this paper, a proposal has been made to incorporate the concept of urbanization level in the maps supplied to different vendors. This in turn would aid the network planners of the telecommunication, and cellular industry to plan the network, BTS site planning, cell size planning and efficient frequency planning also. All the advantages of incorporating urbanization level have also been well discussed.</em><em></em></p><p><em> </em></p><p><strong><em>Keywords</em></strong><strong><em>:</em></strong><em> DTM, Urbanization, GSM, Network, Planning<strong></strong></em></p>2019-03-30T05:17:41+00:00Copyright (c) 2019 Journal of Communication Engineering & Systemshttps://computerjournals.stmjournals.in/index.php/JoCES/article/view/280Performance Analysis of OFDM System Using Non-conventional Transform and Non-conventional Mapping Schemes over Rayleigh Channel2019-03-30T05:19:07+00:00Shilpi Guptasgupta@eced.svnit.ac.inChhaya P. Mehtasgupta@eced.svnit.ac.inU. D. Dalalsgupta@eced.svnit.ac.in<p align="center"><strong>ABSTRACT<em></em></strong></p><p align="center"><strong><em> </em></strong></p><p><em>High data rate wireless transmission is required to meet the rapidly increasing demands for mobile communications. Fast Fourier transform (FFT)-OFDM has drawn much attention due to its simple implementation and robustness against frequency-selective fading channels. Recently, the advantages of the discrete cosine transform (DCT)-based OFDM have come to the light. In this paper, performance of the conventional FFT-OFDM system is compared with non-conventional DCT-OFDM in terms of bit error rate (BER). These performances have been compared in AWGN channel and in multipath environment by considering Rayleigh channel. Performance has been compared with conventional mapping schemes such as BPSK, QPSK and non-conventional mapping schemes such as π/4 DQPSK. Simulation results show that DCT based schemes give better error performance in comparison of FFT based schemes. Particularly, in Rayleigh fading channel DCT-based technique using non-conventional mapping schemes outperforms the conventional mapping schemes.</em></p><p><em> </em></p><p><strong><em>Keywords</em></strong><strong><em>:</em></strong><em> Bit- error rate (BER), Discrete Cosine Transform (DCT), Fast Fourier Transform (FFT), Orthogonal Frequency Division Multiplexing (OFDM), Multicarrier Modulation (MCM).</em><em></em></p>2019-03-30T05:08:21+00:00Copyright (c) 2019 Journal of Communication Engineering & Systemshttps://computerjournals.stmjournals.in/index.php/JoCES/article/view/279Performance Analysis of 802.11 MAC Protocol of Wireless Networks under Misbehaving Condition2019-03-30T06:10:48+00:00Neha Singh Sisodiyanehasinghsisodiya@gmail.comSarita Singh Bhadaurianehasinghsisodiya@gmail.com<p align="center"><strong>ABSTRACT</strong></p><p><strong><em> </em></strong></p><p><em>In this paper the performance of Mac Layer is seen when the number of nodes which are misbehaving increases in the wireless networks. Mobile ad hoc networks depends on the network nodes cooperation in forwarding packets due to the lack of centralized authority. A network node may incline not to cooperate with other nodes in order to save its resources due to selfishness. Here qualnet 5.2 is used for analysis and simulation of the network.</em></p><p><em> </em></p><p><strong><em>Keywords: </em></strong><em>Distributed Coordination Function, 802.11 MAC Protocol, Selfish misbehavior</em></p>2019-03-30T05:00:18+00:00Copyright (c) 2019 Journal of Communication Engineering & Systemshttps://computerjournals.stmjournals.in/index.php/JoCES/article/view/278Mitigation of Mobile Radio Parasitic Radiation Effects: A Review2019-03-30T05:19:07+00:00J. Gavanalonku@ariel.ac.ilT. Triganoalonku@ariel.ac.ilS. Tapuchialonku@ariel.ac.ilA. Kupermanalonku@ariel.ac.il<p align="center"><strong>ABSTRACT</strong></p><p align="center"><strong> </strong></p><p class="31"><em>In this paper, mitigation techniques useful for improving mobile radio systems power efficiency and decreasing electro-smog and specific absorption rate (SAR) induction, affecting human head and body, are presented. An analysis of main radiation effects from far field base stations and review of mitigation techniques for enhancing the efficiency of power transmission for mobile radio systems is shown, followed by an investigation of the complex radiation field components from operating headsets. The importance of the SAR expression is revealed, considering that the power density level does not really matter under near field complex propagation conditions. Mitigation techniques are suggested to improve the power efficiency especially for headsets by decreasing the SAR, affecting headsets user’s head and body. The efficiency of mitigation techniques for usual headsets using an auxiliary antenna or a special space separation method is discussed. It is shown that small physical or multi-bands low SAR and power efficient headsets can be realized using high dielectric substrates and/or polarization diversity. Recent novel mitigation techniques are proposed for small headsets using metamaterial or metacloak fractal antennas, allowing MIMO applications. Different efficient numerical simulation methods, allowing computing the SAR from different headsets, are compared. </em></p><p><strong><em> </em></strong></p><p><strong><em>Keywords:</em></strong><em> Radio systems power efficiency, Base stations, Near-field propagation effects, Headsets performances mitigation techniques, Parasitical radiation reduction, SAR simulation methods<strong></strong></em></p>2019-03-30T04:46:04+00:00Copyright (c) 2019 Journal of Communication Engineering & Systemshttps://computerjournals.stmjournals.in/index.php/JoCES/article/view/277Microstrip Leaky-Wave Antenna with Reduced Ground Plane2019-03-30T04:24:35+00:00Priyank Sharmapriyank.sharma35@gmail.comP. K. Singhalpriyank.sharma35@gmail.com<p align="center"><strong>ABSTRACT<em></em></strong></p><p align="center"><em> </em></p><p><em>This paper is aimed to find the microstrip leaky-wave antenna. The above antenna has become interesting due to its simple shape and geometry. This paper uses a reduced ground plane which can improve the bandwidth of the proposed antenna. This antenna has been simulated on CST-microwave suit software and got fabricated on PCB. The simulated measurements show that the proposed antenna achieves an operating bandwidth of 800 MGHz for a 10-dB return loss and is optimized to the lowest return loss at central frequency 1.2 GHz. From theoretical analysis, it should be appreciated that as the relative dielectric constant of the substrate approaches 1, the LWA bandwidth becomes much wider, improving its performance. In this paper, we present the result of an investigation of a reduced ground plane of LWA with the aim of producing wider bandwidth and sufficient return loss also improves radiation efficiency of the proposed antenna.</em></p><p><em> </em></p><p><strong><em>Keywords:</em></strong><em> </em><em>Reduced ground plane, microstrip leaky-wave antenna (MLWA)<strong></strong></em></p>2019-03-30T04:23:52+00:00Copyright (c) 2019 Journal of Communication Engineering & Systemshttps://computerjournals.stmjournals.in/index.php/JoCES/article/view/276Handoff Call Queuing in Distributed Dynamic Channel Allocation Strategy2019-03-30T06:10:48+00:00Vikram S. Patilvsp.research@gmail.comS. K. Bodhevsp.research@gmail.com<p><strong>ABSTRACT</strong></p><p><em> </em></p><p><em>It is important to utilize the channels very efficiently in cellular system as these channels are meager. In this paper, A Distributed Dynamic Channel Allocation (DDCA) strategy is applied for channel allocation in 9-cell system having non-uniform traffic. Square shape cells with nine cell cluster size have been considered for model development with GSM 1800 specification. The model also considers fixed channel reservation (5–15% of total channel per cell) for handoff calls only, to reduce the handoff call dropping probability (HCDP). Different call arrival rates ranging from 0.1 calls/s to 4 calls/s have been considered. Handoff call queuing method is also implemented for reducing the HCDP. The results indicate that the handoff dropping probability reduces with increase in percentage handoff reservation. Likewise, queuing the Handoff calls further reduces the HCDP. A comparison between HCDP without queuing the handoff calls and with queuing of handoff calls has been attempted.<strong></strong></em></p><p><strong><em> </em></strong></p><p><strong><em>Keywords:</em></strong><em> Dynamic channel allocation, handoff calls, queuing, blocking probabilities, dropping probabilities.<strong></strong></em></p>2019-03-30T04:14:40+00:00Copyright (c) 2019 Journal of Communication Engineering & Systemshttps://computerjournals.stmjournals.in/index.php/JoCES/article/view/275Dual Band Suspended Microstrip Right-angled Isosceles Triangular Patch Antenna2019-03-30T06:10:48+00:00Indrasen Singherindrasen@gmail.comVijay Shanker Tripathierindrasen@gmail.comSudarshan Tiwarierindrasen@gmail.com<p align="center"><strong>ABSTRACT</strong></p><p align="center"><strong><em> </em></strong></p><p><em>In this paper a </em><em>dualband suspended microstrip right-angled isosceles triangular patch antenna is designed for use in microwave imaging system for breast cancer tumour detection. An approximate design equations are developed and validated by CST Microwave Studio’s simulated result. Here dual band operation is achieved by manipulating fundamental mode </em> <em> and higher mode </em> <em> of microstrip antenna. Tuning of this antenna is achieved at frequency 3.35 GHz and 6.70 GHz which shows high frequency ratio 2. This antenna shows good impedance matching, similar radiation pattern and polarization with broadside radiation pattern at both operating frequencies.</em></p><p><strong><em> </em></strong></p><p><strong><em>Keywords</em></strong><em>: </em><em>Microstrip antenna, breast cancer detection, dual band antennas, microwave imaging</em></p>2019-03-30T04:05:39+00:00Copyright (c) 2019 Journal of Communication Engineering & Systemshttps://computerjournals.stmjournals.in/index.php/JoCES/article/view/274Design and Implementation of Real-time Security System in Highly Crowded Zone on Embedded Platform2019-03-30T04:24:08+00:00Abhishek Shuklaabhisheks@isquareit.ac.inSuraj S. Jibhakateabhisheks@isquareit.ac.in<p><strong>ABSTRACT</strong></p><p> </p><p>The gist of this paper is to find answer to a very fundamental question: How safe and free are we as individuals? If not, then how the latest technologies can be used to make us safe and free. This question looks very simple but it is one that is attracting the interest of both the normal human beings like us and the technologists who spend their lifetime to make our life easier and safe. Human security could be said to further enlarge the scope for examining the causes and consequences of the existing ways for the same and at the same time how the implementation of technologies can be done to overcome these issues and make human life as secure as possible. The present paper is an attempt to fill the gap between human safety and technologies which discusses as to how the advanced technology like embedded system can be used to make real-time security systems for highly crowded places like shopping malls, cinema halls, etc., and how these two fields need to be more fully integrated in order to enhance security for all.</p><p> </p><p><strong>Keywords:</strong> Human Security, Embedded System, Virtual Instrumentation (VI), LabVIEW, Proteus, Data Acquisition System<em></em></p>2019-03-29T11:37:29+00:00Copyright (c) 2019 Journal of Communication Engineering & Systemshttps://computerjournals.stmjournals.in/index.php/JoCES/article/view/273Comparison of Ultra Wide Band Indoor Multipath IEEE 802.15.3 Channel Model2019-03-30T04:24:08+00:00Sanjeev Jainsnjece@gmail.comIndrasen Singherindrasen@gmail.com<p align="center"><strong>ABSTRACT</strong></p><p align="center"><em> </em></p><p><em>A very large bandwidth of frequency (3.1–10.6 GHz) has been allocated to UWB systems. A single-band UWB signal propagates differently in the lower and upper bands of the spectrum due to the size of its bandwidth. The lower part of the signal can be obstructed more easily and the man-made interferences are not homogeneously distributed over the whole spectrum. The first experimental results obtained for a UWB channel show short-time duration of the CIR, strong path loss attenuation and a great number of resolvable multipaths. Most of the channel models proposed for UWB communications support the clustered ray arrival assumption described in different multipath amplitude distributions. As far as UWB path loss is concerned, general propagation physics approaches are valid, i.e., a longer distance between transmitter and receiver elements implies a lower amount of energy received. This amount of transmitted energy received at any distance of the transmitter can be computed by a propagation loss calculation using the vast amount of measurement data collected in the process of channel modeling. In order to obtain a suitable model, a great number of experimental measurements were taken to accurately characterize the UWB channel in different environments. This paper is focused on the IEEE 802.15.3a channel model. This introduces UWB channel characteristics and focuses on the model for high-data rate UWB applications, known as the IEEE 802.15.3a channel model. To start, the multipath model and the main characteristics of the IEEE 802.15.3a channel model and derive the distribution of the attenuation factors of the channel model and obtain their mean and standard deviation values.</em></p><p><em> </em></p><p><strong><em>Keywords:</em></strong><em> </em><em>UWB, IEEE Channel 802.15.3, mean, multipath<strong></strong></em></p>2019-03-29T10:50:51+00:00Copyright (c) 2019 Journal of Communication Engineering & Systemshttps://computerjournals.stmjournals.in/index.php/JoCES/article/view/272Analysis of N-Slot Loaded Patch Antenna for Tripple Band Operation2019-03-30T04:24:08+00:00Nand Kishoreerindrasen@gmail.comIndrasen Singherindrasen@gmail.comVijay Shanker Tripathierindrasen@gmail.com<p align="center"><strong>ABSTRACT</strong></p><p><strong><em> </em></strong></p><p><em>In this paper, the analysis of N-slot loaded microstrip antenna having single and double dielectric layer with coaxial feeding is presented using circuit model analysis. The antenna gives triple resonance and the separation between these resonances depends on the dimension of the slot. This antenna gives wide bandwidth for all three resonant frequencies for single dielectric and gives four bandwidths for double dielectric layer. It is observed that the resonance frequency decreases with increasing slot width but increases with increasing the slot length. The mathematical results are compared with the simulated results obtained from HFSSv12 and both results are close.</em></p><p><em> </em></p><p><strong><em>Keywords: </em></strong><em>Patch antenna, inclined slot loaded patch, N-slot loaded patch, triple band antenna, two dielectric layers, MPA (microstrip patch antenna)<strong></strong></em></p>2019-03-29T10:43:07+00:00Copyright (c) 2019 Journal of Communication Engineering & Systemshttps://computerjournals.stmjournals.in/index.php/JoCES/article/view/271An Approach towards Seamless Handover with Maximum Resource Utilization in Mobile Wireless Networks2019-03-30T04:24:08+00:00Sudesh Pahalpahal.sudesh@gmail.comBrahmjit Singhpahal.sudesh@gmail.comAshok Arorapahal.sudesh@gmail.com<p align="center"><strong>ABSTRACT</strong></p><p align="center"><strong><em> </em></strong></p><p><em>In mobile wireless networks, a seamless handover between different communication systems has been a challenging issue. A link going down (LGD) event based on L2 layer information has been incorporated by the IEEE 802.21, media independent handover (MIH) framework. Link going down trigger allows accomplishing handover efficiently with the prior intimation of handover and enables L3 entities streamline their handover (HO) related activities. As velocity of user has a significant impact on HO initiation, predefined LGD signal strength threshold is not a good option to trigger an LGD event. To achieve seamless HO and to maximize network resources, it is necessary to make LGD threshold signal strength velocity adaptive in mobile wireless networks. In this paper, we make a comparative study of velocity adaptive handover algorithm and propose an approach to improve HO performance. We show that by triggering an LGD event, based on appropriate LGD threshold, the link failure probability and probability of false handover may be significantly decreased in mobile wireless networks.</em></p><p><em> </em></p><p><strong><em>Keywords:</em></strong><em> Mobile wireless network, handover, MIH, 802.21, link going down trigger <strong></strong></em></p>2019-03-29T10:31:54+00:00Copyright (c) 2019 Journal of Communication Engineering & Systemshttps://computerjournals.stmjournals.in/index.php/JoCES/article/view/270A New Effective MUSIC Algorithm for Direction of Arrival Estimation and Combining It with Beam Forming in Smart Antenna Systems2019-03-30T06:10:47+00:00T. S. Ghouse Bashaghouse2604@gmail.comP. V. Sridevighouse2604@gmail.comM. N. Giri Prasadghouse2604@gmail.com<p align="center"><strong>ABSTRACT</strong></p><p align="center"><strong><em> </em></strong></p><p><em>Smart antenna is now commonly used in communication systems due to its high advantages. Two important functions in smart antenna are direction of arrival estimation and beam forming. The main aim of direction of arrival estimation in smart antenna is to estimate the direction of the signal and based on this angle the beam forming will identify the exact position and phase angle of the antenna. Here we proposed a new MUSIC algorithm for direction of arrival method to improve the performance of smart antenna. The proposed method uses genetic algorithm and neural network for direction of arrival estimation and beam forming. By using this method, the interference signal reduces and also the performance of the system increases. </em></p><p><strong><em> </em></strong></p><p><strong><em>Keywords:</em></strong><em> Smart antenna, direction of arrival, beam forming, genetic algorithm, neural network.<strong></strong></em></p>2019-03-29T09:52:14+00:00Copyright (c) 2019 Journal of Communication Engineering & Systemshttps://computerjournals.stmjournals.in/index.php/JoCES/article/view/269Simulation Based Performance Analysis of Wired Computer Networks2022-01-03T10:01:58+00:00Rahul Malhotrablessurahul@gmail.comVaibhav Nijhawanvaibhav.nijhawan@gmail.com<p align="center"><strong>Abstract</strong></p><p align="center"><strong> </strong></p><p><em>Simulation is the process of accessing the real-world scenario in a virtual way. The purpose of simulation modeling is to ease the understanding of real working situations, to surge its behavior and its reactions during particular events. It is the application of computational models to the study and prediction of physical events or the behavior of engineered systems. Selection of a particular network simulator involves factors like availability of simulator, its relative ease of use, network modeling flexibility, code reusability factor, hardware and software requirements, output reports and graphical plots. In this paper, performance analysis of wired networks has been done under variable data packet size from 500 bits, 1000 bits to 1500 bits.</em></p><h1><em style="font-size: 1.5em;">Keywords:</em><em style="font-size: 1.5em;"> </em><strong style="font-size: 1.5em;"><em>OPNET, packet size, wired networks</em></strong></h1><h2> </h2>2019-03-29T06:06:12+00:00Copyright (c) 2019 Journal of Communication Engineering & Systemshttps://computerjournals.stmjournals.in/index.php/JoCES/article/view/268Recent Advances of Distributed Optical Fiber Raman Amplifiers in Ultra Wide Wavelength Division Multiplexing Telecommunication Networks2022-01-03T10:01:58+00:00Abd El–Naser A. Mohamedahmed_733@yahoo.comAhmed Nabih Zaki Rashedahmed_733@yahoo.comMahmoud M. A. Eidahmed_733@yahoo.com<p align="center"><strong>ABSTRACT</strong></p><p><em>Recently, many research works have been focused on the fiber optic devices for optical communication systems. One of the main interests is on the optical amplifiers to boost a weak signal in the communication systems. In order to overcome the limitations imposed by electrical regeneration, a means of optical amplification was sought. The competing technology emerged: the first was Raman amplification. One reason was that the optical pump powers required for Raman amplification were significantly higher than that for Erbium doped fiber amplifier (EDFA), and the pump laser technology could not reliably deliver the required powers. However, with the improvement of pump laser technology Raman amplification is now an important means of expanding span transmission reach and capacity. We have deeply studied an analytical model for optical distributed Raman amplifiers (DRAs) in the transmission signal power and pump power within Raman amplification technique in co-pumped, counter-pumped, and bi-directional pumping direction configurations through different types of fiber cable media. The validity of this model was confirmed by using experimental data and numerical simulations. </em></p><p><strong><em>Keywords:</em></strong><em> Distributed Raman amplifier, Fiber link media, Signal power, Pump power, and Raman gain efficiency.</em></p>2019-03-29T05:51:19+00:00Copyright (c) 2019 Journal of Communication Engineering & Systemshttps://computerjournals.stmjournals.in/index.php/JoCES/article/view/267Networked Embedded Systems Eliminate Safety Hazards in Rail Journey2022-01-03T10:01:58+00:00R. N. Pandarnpanda_1946@yahoo.co.inA. Kumarrnpanda_1946@yahoo.co.inK. C. Royrnpanda_1946@yahoo.co.inMrinmoy Sarkarrnpanda_1946@yahoo.co.in<p class="STMAbstract"><strong>ABSTRACT</strong></p><p class="STMAbstract"> <em>Introducing R&D into Rail transport is a good way to make sure that Railway decisions reflect the needs of passengers. Putting in place a foolproof security architecture and best brand components in the design of a safety system can ensure railway commutation in a high security environment. Managing security through proactive monitoring and event management is the key for achieving desired results. Safety and Punctuality — the two watch words of Indian Railways (IR) can be simultaneously achievable. Through technological innovations excellence at both ends are possible. To begin with, the age-old and ineffective alarm chain pulling (ACP) system of MEMU coaches with electromechanical design can very well be replaced by a system of networked microcontroller boards interconnected by the existing electrical wirings. An accurate digital signal processing in an electrically flashy environment, has been planned for execution. The innovations described in this work combine P89C51RD2 microcontroller’s powerful instruction repertoire and other outstanding features like open-ended architecture and communications in RS-485 mode in the networked configuration, backed up by a sound Analog-Digital Engineering. Simplicity in design, use of inexpensive [Neil Geoff. Good Simple and Practical Systems that are used by all-Pilbar Rail Journey to Safety focused culture. Available at <a href="http://www.intlrailsafety.com/Perth/Pres/Neil-paper.pdf">http://www.intlrailsafety.com/Perth/Pres/Neil-paper.pdf</a>] industry standard hardwares and a non-blocking communication in the networked environment either in polling or interrupt mode, and compact assembly level programming can make this product design very cost effective, highly reliable, and MEMU worthy. The detailed design blue prints will describe the design, its implementation to prove how passengers’ safety is unfailingly ensured during an otherwise unsafe and vulnerable journey through electric trains (MEMUs). ACP indication circuitry engineered appropriately and mounted at the rear end of each compartment of a moving carriage will not only provide an audio visual indication on the dashboard of the motorman of the moving train but will also provide much more vital information that can be recalled later.</em></p><p class="STMnormal"><strong><em>Keywords:</em></strong><em> Main line Electrical Multiple Unit (MEMU), alarm chain pulling (ACP), Indian railways (IR), four coach unit of MEMU (rake), noise margin (NM), comptroller and auditor general of India (CAG), British broadcasting corporation (BBC</em></p>2019-03-29T05:43:11+00:00Copyright (c) 2019 Journal of Communication Engineering & Systemshttps://computerjournals.stmjournals.in/index.php/JoCES/article/view/266Improvement in Return Loss of Power Splitter on EBG2022-01-03T10:01:58+00:00Biswajeet Mukherjeeb.mukherjee@iiitdmj.ac.in<p align="center"><strong>ABSTRACT</strong></p><p><em>In this paper, it has been investigated to improve the return loss of a power splitter/ divider designed by partial removal of EBG rods. The EBG used is a rod structure and shows a Band Gap in the range of 1.55 to 2.9 GHz. The Power Splitter has a return loss at 2.45 GHz which falls in the range of the Band Gap. It has been found that in order to improve the return loss significantly, a larger matrix of the EBG structure is needed. However, the removal of rods, as the matrix size is increased, needs to be done with a fixed ratio of the input feed length to coupling length to maintain the same resonant frequency. The improvement in the return loss has been significant from -19.932 dB for a 5×5 matrix to -36.282 dB for a 13×13 matrix.</em></p><p><em> </em></p><p><strong><em>Keywords: </em></strong><em>Power Splitter/ Divider, Electromagnetic Band Gap (EBG), Return Loss, Dielectric, </em><em>S parameters.</em></p>2019-03-29T05:33:01+00:00Copyright (c) 2019 Journal of Communication Engineering & Systemshttps://computerjournals.stmjournals.in/index.php/JoCES/article/view/265‘Cloud Computing’: A Virtual Way of Accessing Technology2022-01-03T10:01:58+00:00Abhishek Shuklaabhisheks@isquareit.ac.inSameer Huddarabhisheks@isquareit.ac.inSubhash Sangeethamabhisheks@isquareit.ac.in<p align="center"><strong>ABSTRACT</strong></p><p><em>Cloud computing is the latest innovation for today’s virtual accessing demands. One needs to be updated with every new era as well as, with latest available technologies as quick as possible. Cloud computing provides the best suited environment platform to the end user who is willing to be the part of the development of latest innovative technologies. In this paper, a thorough knowledge of the functioning, infrastructure as well as the power of cloud computing has been explained. This paper provides the complete understanding of the methodologies, limitations and advantages of using cloud computing. This paper elaborates the necessity for computing, demands for accessing virtual tools and the earlier ways for fulfilling the same. The paper also covers some of the significant application based case studies of cloud computing & also discuss some security issues. Overall, it has been explained that how this latest technology is emerging as the latest way to access the tools virtually and globally. </em></p><p><em> </em></p><p><strong><em>Keywords:</em></strong><em> Cloud computing, cloud services, SaaS, IaaS, PaaS, cloud securities, cloud configuration</em></p>2019-03-29T05:12:15+00:00Copyright (c) 2019 Journal of Communication Engineering & Systemshttps://computerjournals.stmjournals.in/index.php/JoCES/article/view/264Classrooms of 20202022-01-03T10:01:58+00:00Anil Kakrananilkakran@yahoo.co.inSubhanshu Guptaanilkakran@yahoo.co.inP. Tharejaanilkakran@yahoo.co.in<p align="center"><strong>ABSTRACT</strong></p><p><em>This work envisions the profile of future classrooms, circa 2020. The idea is to sketch the horizon for its growth by keeping in mind the current and future trends in technology vis-à-vis the objectives of learning. Future education system will be completely revamped and there will be a need to redesign our classroom in accordance with technological advancements. Technology is a powerful means to enhance our abilities, to think, to learn, to communicate and to use our brains creatively and logically. Use of technology in learning proved to be a boon and a solution to the problems in this fast learning environment. No doubt that technology can transforms traditional classrooms into digital smart classrooms, but to what extent it interfaces with the probable or real developments remains to be seen. Further will these digital smart classrooms provide best learning environment, which is need of 2020 education system. </em></p><p><em> </em></p><p><strong><em>Keywords:</em></strong><em> </em><em>ICT: Information and Communication Technology, Virtual Reality, </em><em>Harkness Discussion Method, competency and Attitude, IFC (innovation, futuristic vision and challenge)</em></p>2019-03-29T05:00:55+00:00Copyright (c) 2019 Journal of Communication Engineering & Systemshttps://computerjournals.stmjournals.in/index.php/JoCES/article/view/146Optimizing Hive Performance on Analyzing Log Data with Hadoop2020-05-16T09:18:19+00:00L. K. Vishwamitravijayspawar02@gmail.comVijay Singh Pawarvijayspawar02@gmail.com<p class="Default">Web servers automatically created or maintained the log files to observe the user behaviour. So, we can get the valuable information through analyzing these server log files. Log files collect a variety of data about information requests to your web server. Server logs act as a visitor sign-in sheet. Server log files can give information about what pages get the most and the least traffic? What sites refer visitors to your site? What pages that your visitors view? There is huge usage of web which generates a huge amount of log files and processing such huge amount of log files using RDBMS creates problem. In this we proposed Hadoop which is an open source solution for handling big data. For analysis we can use bigdata analytical tool called hive which works on top of the Hadoop. Hive support SQL like language to analyze the data called HiveQL. In this paper we can also enhance the performance of hive query on analyzing log data.</p><p><strong>Cite this Article</strong></p><p>L.K. Vishwamitra, Vijay Singh Pawar. Optimizing Hive Performance on Analyzing Log Data with Hadoop. <em>Journal of Communication Engineering & Systems</em>. 2018; 8(3): 45–52p.<strong></strong></p>2019-03-06T05:23:46+00:00Copyright (c) 2018 Journal of Communication Engineering & Systemshttps://computerjournals.stmjournals.in/index.php/JoCES/article/view/123Investigation of Microhardness and Microstructure Using Friction Stir Welding of Dissimilar Aluminium Alloys2020-05-16T09:17:59+00:00Sanjeev Vermaer.verma.11@gmail.comVinod Kumarer.verma.11@gmail.com<p>In this paper Friction Stir Welding (FSW) of two dissimilar aluminium alloys (AA5083 and AA6061) was successfully carried out by considering their advancing and retreating side during the process. It was observed from this experiment that the materials located on advancing side experience a longer contact under the shoulder of tool during process. This contact causes deformed and undeformed material to get larger contact with each other, so that the metallic bond results higher strength. The joint fabricated using AA6061 on retreating side and AA5083 on advancing side showed less hardness as compared to the joint fabricated using AA5083 on retreating side and AA6061 on advancing side. It has been also observed from microstructure analysis that the joint fabricated through AA5083 on retreating side gives defect free welds.</p><p><strong>Cite this Article</strong></p><p>Sanjeev Verma, Vinod Kumar. Investigation of Microhardness and Microstructure Using Friction Stir Welding of Dissimilar Aluminium Alloys. <em>Journal of Communication Engineering & Systems</em>. 2018; 8(3): 37–44p.<strong></strong></p>2019-03-05T12:49:17+00:00Copyright (c) 2018 Journal of Communication Engineering & Systemshttps://computerjournals.stmjournals.in/index.php/JoCES/article/view/210Performance Analysis of DE-QPSK and π/4 QPSK with MRC Receiver over η-µ fading channel2020-05-16T09:18:32+00:00Kiranpreet Kaurkiranpreetk@yahoo.comT. S. Kamalkiranpreetk@yahoo.comJ. S. Ubhikiranpreetk@yahoo.com<p>This study presents approximate but simple expression for the average symbol error rate of differentially encoded quadrature phase shift keying (DE-QPSK) and π/4 QPSK with Maximal Ratio Combining (MRC) diversity over independent η-µ fading channels. Numerical results demonstrate the error performance for different values of fading parameter µ for Lth order MRC for Format 1 and Format 2. Furthermore, error performance of both modulation techniques has also been analyzed for Nakagami-m, Rayleigh, one sided Gaussian and Hoyt fading as a special case.</p><p><strong>Cite this Article</strong></p><p>Kiranpreet Kaur, T.S. Kamal, J.S. Ubhi. Performance Analysis of DE-QPSK and π/4 QPSK with MRC Receiver over η-µ fading channel. <em>Journal of Communication Engineering & Systems</em>. 2018; 8(3):<br /> 53–59p.</p>2019-03-05T12:22:28+00:00Copyright (c) 2018 Journal of Communication Engineering & Systemshttps://computerjournals.stmjournals.in/index.php/JoCES/article/view/222Assessment of various Biometric Techniques2020-05-16T09:16:52+00:00Rahul Kaushalrahul09kuk@gmail.com<p>In this day and age, information security is a noteworthy issue; there are various strategies to anchor information or forestall unapproved get to biometrics is a quickly developing innovation that is as a rule generally utilized in forensics, security; avoid unapproved access in bank or ATMs. There are various types of biometrics currently being incorporated with innovation stages. As biometric innovation develops there will be an expanding cooperation among the market, innovation, and the applications. This cooperation will be impacted by the additional estimation of the innovation, client acknowledgment, and the validity of the specialist organization. In this paper, we present a short presentation of biometric system applications, and we have contemplated and analyzed five biometric strategies along seven elements.</p><p><strong>Cite this Article</strong></p><p>Rahul Kaushal. Assessment of Various Biometric Techniques. <em>Journal of Communication Engineering & Systems</em>. 2018; 8(3): 18–23p.</p>2019-03-05T11:22:47+00:00Copyright (c) 2018 Journal of Communication Engineering & Systemshttps://computerjournals.stmjournals.in/index.php/JoCES/article/view/249Review and Analyze Low Cross Polarized Feed for Offset Parabolic Reflector Antenna for S-Band Application2020-05-16T09:17:46+00:00Prashant Sachaniyaprashant.sachaniya@yahoo.inHoney Dhandhukiahoneydhandhukia48@gmail.comDr. J. M. Rathodjmrathod@bvmengineering.ac.in<p>This study discusses the design of low cross polarized feed for offset parabolic reflector antenna and its application. Conical corrugated horn antenna consists of an input mode TE<sub>11 </sub>and the corrugation part requires a transition to HE<sub>11</sub> mode for propagation. The paper presents the widely used design of TE<sub>11</sub>-HE<sub>11</sub> mode converter i.e. Variable slot mode converter. Three different design of corrugated horn antenna is presented for optimizing the value of cross polarization. The choice of the delta is the most important parameter for optimizing the value of cross polarization. The value of f/D is chosen 0.4 for offset parabolic reflector antenna. This design also provides high gain, good beam symmetry, and high bandwidth performance.</p><p><strong>Cite this Article</strong></p><p>Prashant D. Sachaniya, Honey Dhandhukia, Jagdish M. Rathod. Review and Analyze Low Cross Polarized Feed for Offset Parabolic Reflector Antenna for S-Band Application. <em>Journal of Communication Engineering & Systems</em>. 2018; 8(3): 30–36p.<strong></strong></p>2019-03-05T11:01:35+00:00Copyright (c) 2018 Journal of Communication Engineering & Systemshttps://computerjournals.stmjournals.in/index.php/JoCES/article/view/240Compact Microstrip Patch Antenna Using Metamaterials To Perform As Narrow Band LTE Receiver Antenna2020-05-16T09:17:23+00:00Tushar P. Davetpdavesurat@gmail.comNita T. Davendm109@gmail.comJagdish M. Rathodjmrathod@bvmengineering.ac.in<p class="Abstract">This paper presents the review of various stages of development for improving the parameters of microstrip patch antenna. The main focus of paper is on metamaterials as this material is used to extend the capability of microstrip patch antenna and ultimately antenna can be improved for its utilization in different applications which were not earlier due to limitations of simple microstrip patch antenna. This paper also presented design of compact patch antenna using metamaterials with dimension of 25mm×20mm to produce narrow band resonance so as to work as narrow band receiver and clearly reject all other adjacent signals for better output. The proposed antenna of size achieves two bands of LTE that is band 22 and nearly band 21.</p><p><strong>Cite this Article</strong></p><p>Tushar P. Dave, Nita T. Dave, Jagdish M. Rathod. Compact Microstrip Patch Antenna Using Metamaterials to Perform as Narrow Band LTE Receiver Antenna. <em>Journal of Communication Engineering & Systems</em>. 2018; 8(3): 24–29p.<strong></strong></p>2019-03-05T10:52:22+00:00Copyright (c) 2018 Journal of Communication Engineering & Systemshttps://computerjournals.stmjournals.in/index.php/JoCES/article/view/242Low profile L5 and S band Microstrip antenna for IRNSS Application Using Coxial Feed2020-05-16T09:16:32+00:00Shahidmohammed Salauddin Modasiyashahid@gecg28.ac.inJ. M. Rathodjmrathod@bvmengineering.ac.inP. M. Panchalphpanchal@bvmengineering.ac.inB. J. Makwanashahid@gecg28.ac.in<p><em>In recent aura, navigation is one the most demanding technology. To increase coverage, gain and bandwidth are more important of any wireless communication systems India has developed its own navigational system called IRNSS which work one two frequency band one is L5 </em><em> (1.176 GHz) </em><em>and second one is S band (</em><em>2.482-2.502 GHz) </em><em>In this paper we proposed 2 different antenna one for L5 band and second for S band antenna for Navigational Application. Both the antenna has good amount of gain, more bandwidth and directional radiation Patterns which is good for navigational application</em></p><p><strong>Cite this Article</strong></p><p>Shahid S. Modasiya, J.M. Rathod, P.M. Panchal et al. Low Profile L5 and S Bands Microstrip Antenna for IRNSS Application using Coaxial Feed. <em>Journal of Communication Engineering & Systems</em>. 2018; 8(3): 7–17p. <strong></strong></p>2019-02-11T09:53:31+00:00Copyright (c) 2018 Journal of Communication Engineering & Systemshttps://computerjournals.stmjournals.in/index.php/JoCES/article/view/116Data Security in Cloud Computing2020-05-16T08:40:42+00:00Kamal Upretikamalupreti1989@gmail.comCloud computing is one of the rapidly developing technology in the IT industry due to its performance, optimal cost, easy deployment, reduced management and so on. As per consumers point of view, security in cloud computing mainly concerns, data security and data privacy issues. According to IDC (International Data Corporation) survey, security acts as a biggest challenge among the cloud users. The biggest concern about cloud is security which plays a dominant role, because it is essential to ensure that only authorized access is allowed. This paper highlights some data security issues related to cloud computing and discusses its possible solutions to protect data from the beginning to the end over a channel (internet).In the last section, we perform comparative analysis of various solutions for data security issues on the basis of certain parameters: - Integrity, Confidentiality, Availability (CIA rule).2018-12-05T07:22:25+00:00Copyright (c) 2018 Journal of Communication Engineering & Systemshttps://computerjournals.stmjournals.in/index.php/JoCES/article/view/117Improving Software Cost Estimation Process through Classifcation Data Mining Algorithms using WEKA Tool2020-05-16T08:40:59+00:00Deepak Jaindeepakbaba92@gmail.com<p>Today, the Software Cost Estimation (SCE) is one of the hot research areas among the researchers. Cost estimation is a method of the achievable cost of a product, thing, program, or an undertaking, enrolled in light of available information. It attempts to data predict good results to combined both of the field software engineering and data mining in this work. It generates the accurate cost of the projects with the help of different datasets whose cost and effort is unpredicted and investigate the common cost factors. In this paper, the most popular data mining algorithms such as Support Vector Machine (SVM) and Naïve Bayes (NB) have been used to estimate the cost of the projects and the accuracy of machine learning algorithms.</p>2018-12-05T07:22:25+00:00Copyright (c) 2018 Journal of Communication Engineering & Systemshttps://computerjournals.stmjournals.in/index.php/JoCES/article/view/119Design of Smart Filter for Impulsive Noise Cancellation in Images2020-05-16T08:45:46+00:00Mihir Narayan Mohantymihir.n.mohanty@gmail.com<p>Noise is nature inherent. It can affect any type of signal or noise at the time of acquisition. Impulsive is one of the noise which appears suddenly with the signal or noise. In this paper, we have considered the images affected by impulsive noise. A filter based on fuzzy logic is designed and it can suppress noise in any environment at any time. It is based on standard fuzzy rules if input is high then output is high or else if input is low then the corresponding output is also low. However the rules are utilized in adaptive manner based on the median of the pixels of the image. Results shows the performance of the proposed model. A comparison between different filters and proposed filter.</p>2018-12-05T07:22:25+00:00Copyright (c) 2018 Journal of Communication Engineering & Systemshttps://computerjournals.stmjournals.in/index.php/JoCES/article/view/120A Survey on Neural Network based Classifier for Arrhythmia Detection2020-05-16T08:46:20+00:00Mihir Narayan Mohantymihir.n.mohanty@gmail.com<p>Electrocardiogram (ECG) is one of the important diagnostic tool for the detection of the heart problem. Increasing number of cardiac patients need automatic detection techniques for various abnormalities or arrhythmias of the heart to reduce pressure on physicians and share their load. Coronary Care Units (CCUs) emphasizes on the task of accurate analysis of ECG signal at an early stage that can prevent disease, like tachycardia, to escalate there by reducing the mortality rate. The diagnostic power of these machines has grown manifolds mainly due to the exploration of effective and discriminate feature spaces that remain crucial for pattern classification and detection. In this paper a literature survey is conducted for the classification and detection of Arrhythmia using different machine learning techniques. The classification is also done using MLP and DNN. Around 96% and 99% classification accuracy is obtained from these two classifier respectively.</p>2018-12-05T07:22:25+00:00Copyright (c) 2018 Journal of Communication Engineering & Systemshttps://computerjournals.stmjournals.in/index.php/JoCES/article/view/122Denoising of ECG Signal using Savitzky-Golay Filter2020-05-16T08:47:03+00:00Mihir Narayan Mohantymihir.n.mohanty@gmail.com<p>Noise is character inherent. Any type of signal can be affected by noise at the time of acquisition. Signal noise can be generated from various conditions and it is difficult to avoid. ECG is a graphical structure which represents the functionality of the heart. Good quality of ECG signal will help physicians for better diagnosis. But in real situation ECG recordings are courted by noise and this noise should be removed for better clinical use. In this paper a Savitzky-Golay Filter is designed for denoising of ECG signal. An noisy ECG signal is collected from MIT-BIH Data base and then the noise is removed by using this Savitzky-Golay filter. The filter is providing a good performance result and it is presented in the result section of the paper.</p>2018-12-05T07:22:25+00:00Copyright (c) 2018 Journal of Communication Engineering & Systemshttps://computerjournals.stmjournals.in/index.php/JoCES/article/view/127IOT in Supply Chain and Logistics: A Critical Review2020-05-16T08:47:41+00:00Samrat Majumdarsushant.tripathy@gmail.comSouparna Duttasushant.tripathy@gmail.comSushanta Tripathysushant.tripathy@gmail.com<p> <strong>Abstract</strong> </p><p>Internet of Things (IoT) is a major component now-a-days in the industrial scenario. From procurement to supply chain, logistics every process can be made more organized and less time consuming as well as increasing the efficiency of the processes. This paper critically reviews the till date research on IoT in Logistics and supply chain and tries to obtain a logical conclusion of any research gap if any. In this paper, a total of 25 literature have been critically reviewed to extract the conclusion.</p><p> <strong>Keyword</strong></p><p>IOT, Supply Chain, Logistics, Literature Review, Smart Manufacturing, Smart Logistics.</p>2018-12-05T07:22:25+00:00Copyright (c) 2018 Journal of Communication Engineering & Systemshttps://computerjournals.stmjournals.in/index.php/JoCES/article/view/126Productivity Measurement of Academic Institutes: An AHP Approach2020-05-16T08:47:57+00:00Sushanta Tripathysushant.tripathy@gmail.com<h2>Abstract</h2><p>In the long run, an organization will only perform excellently when it succeeds in balancing all the needs of its stakeholders. Long-term success requires customer satisfaction and loyalty, which in turn is based on fulfilling the needs of the organization through an appropriate performance measurement model. Therefore, there is an ardent need to evaluate the performance of the management institutes in a state like Orissa, where burgeon of technical/management institutes hasled to a fall in the standard of technical education. Hence this study has been undertaken to find out the different aspects of a management institute to be focused upon & to measure the productivity of different management institutes with regard to those different aspects. For the above purpose an Analytical Hierarchy Process (AHP) model has been used to evaluate the performance of the six management institutes in southern part of Orissa. Different criteria affecting the performance evaluation of the management institutes are considered and it is observed that qualitative and quantities resultshave the maximum impact in this evaluation process with the highest priority value. Based on these criteria, the performance of six management institutes are evaluated and subsequently ranked.</p><p> </p><h2>Keywords</h2><p>Performance Evaluation, Management Institute, Analytic Hierarchy Process (AHP)</p>2018-12-05T07:22:25+00:00Copyright (c) 2018 Journal of Communication Engineering & Systemshttps://computerjournals.stmjournals.in/index.php/JoCES/article/view/124Evaluation of Mechanical Properties of Glass Fibre and Carbon Fibre Reinforced Polymer Composite2020-05-16T09:11:31+00:00Arunabha Batabyalsushant.tripathy@gmail.comRamesh Kumar Nayaksushant.tripathy@gmail.comSushanta Tripathysushant.tripathy@gmail.com<p><strong>Abstract</strong></p><p> </p><p>Fiber reinforced polymer composite materials are gradually substituting traditional metallic materials because of their high specific strength and better corrosion resistance. However, the cost of the composites is still higher than the traditional materials. Different fibers are used in polymer matrix composites. Glass and carbon fiber are one of the promising reinforcements in polymer matrix composites. In this project, a comparison of mechanical properties and erosion resistance has been investigated for glass and carbon fiber composites. The composites were fabricated by hand lay-up technique. Different molding loads were applied during the curing process of composites. The effects of molding loads on tensile strength, modulus and wear resistance of the composites were evaluated. It is observed that with increase in molding load the tensile strength, modulus and wear resistance decreases. In this work it is observed that the optimum molding load to achieve better mechanical properties is 10Kg.</p><p><strong>Keywords</strong></p><p>Carbon Fibre, Glass Fibre, Composite Materials, Mechanical Properties, Tensile Test, Air Erosion Test.</p><p> </p>2018-12-05T07:22:25+00:00Copyright (c) 2018 Journal of Communication Engineering & Systemshttps://computerjournals.stmjournals.in/index.php/JoCES/article/view/145Evaluation of Options using The Cox-Ross-Rubinshtein Mathematical Model2020-05-16T09:11:49+00:00Chetna Sharmachetna.modicollege@gmail.com<p>Using complex mathematical formulas, we can calculate the reasonable value of an option.The Cox-Ross-Rubinstein model takes into account factors that are not considered in the Black-Scholes model and is an improved version of the binomial model. At the same time, the Cox-Ross-Rubinshtein model gives results close to the Black-Scholes model. The difference between these two models is that the Cox Ross Rubinstein modeltakes into account the possibility of early execution of the Option, which is very important with a high risk-free interest rate. The present paper mathematically highlights how the options can be evaluated using the Cox Ross Rubinstein model.</p>2018-12-05T07:22:25+00:00Copyright (c) 2018 Journal of Communication Engineering & Systemshttps://computerjournals.stmjournals.in/index.php/JoCES/article/view/121IOT: A New Dimensions to Supply Chain Management2020-05-16T09:12:08+00:00Sushanta Tripathysushant.tripathy@gmail.comAishwarya Dashsushant.tripathy@gmail.com<p><strong>Abstract</strong></p><p> </p><p>Now a day’s manufacturing and service organisations are surviving due to its efficient and effective Supply Chain Management (SCM). Internet Of Things (IOT) is a system which enables SCM to perform better by exchanging information with other connected devices, the operator or the manufacturer which is embedded with sensors, software, electronics and connectivity. This paper focuses a detailed study of past literatures regarding the significance of IOT in supply chain. The study will assist the decision makers of manufacturing organisations to understand the importance of IOT to enhance the productivity.</p><p><strong>Keywords</strong> </p><p>IOT, Supply Chain Management, Industry 4.0, Digital Supply Chain</p>2018-12-05T07:22:25+00:00Copyright (c) 2018 Journal of Communication Engineering & Systemshttps://computerjournals.stmjournals.in/index.php/JoCES/article/view/148A Methdology of Software Cost Estimation Techniques for Data Mining2020-05-16T09:12:38+00:00A. K. Sharmadrarvindkumarsharma@gmail.com<p>Many software projects fail every year due to increasing size and complexity of software projects. To deal with this problem many researcher have been focused on this area of Cost estimation since 1960s. The cost estimation is usually dependent upon the size estimate of the project, which may use lines of code as metrics. Software engineering plays an important role in software development process. It is used to develop quality software. The quality software is developed using vast amount of software engineering data. The alternative technique is to develop a model unique to a particular environment, which should more accurately reflect that environment. In this paper, a methdology of software cost estimation techniques for data mining is presnted.</p><p> </p>2018-12-05T07:22:25+00:00Copyright (c) 2018 Journal of Communication Engineering & Systemshttps://computerjournals.stmjournals.in/index.php/JoCES/article/view/182Effect of Outdated CSI in a Multiuser TAS/MRC System over Correlated Nakagami-m fading2020-05-16T09:13:39+00:00Rajkishur Mudoirajkishur@gmail.com<p>The TAS/MRC system is a widely accepted technique to reduce the complexity level of a multiuser MIMO system with little reduction in the performance. This increases the practical applicability of TAS/MRC system. In TAS/MRC algorithm the channel state information (CSI) is provided to the transmitter for selection of best transmitting antenna for better system performance. However, two important factors may reduce the performance of the TAS/MRC system considerably, out dated CSI and the antenna correlation. For analysis of TAS/MRC system, it has been considered that the CSI is being sent back to the receiver through a loss less channel. For practical applications this is not true, hence, the error in CSI needs to be considered in the analysis. Similarly the performance of MRC receiver degrades considerably due to the correlation among the receiving antennas. In this paper we have analysed a TAS/MRC system considering both outdated CSI and exponential correlation for a Nakagami-m fading environment. Various performance measures have been presented in this analysis and the effect of both correlation and outdated CSI have been studied. It has been found that small amplitude error in CSI, may degrade the performance of the system considerably, compared to the phase error of the CSI.</p>2018-12-05T07:22:25+00:00Copyright (c) 2018 Journal of Communication Engineering & Systemshttps://computerjournals.stmjournals.in/index.php/JoCES/article/view/183A Study on Various Cryptography Techniques2020-05-16T09:14:24+00:00Gagandeep Singhgagandeep.singh@gnauniversity.edu.in<p>Internet has become one of the most important medium for communication. At the same time, it faces many challenges concerned with the security of information being transferred. Public key cryptography is one of the most popular techniques used to provide security over internet. This paper we discuss various public key encryption techniques and the challenges faced by them. At last we discussed the challenges and put forward some ways which can help us to resolve these challenges.</p>2018-12-05T07:22:25+00:00Copyright (c) 2018 Journal of Communication Engineering & Systemshttps://computerjournals.stmjournals.in/index.php/JoCES/article/view/152Performance Investigation of OLSR and AODV Routing Protocols for 3 D FANET Environment using NS32020-05-16T09:13:17+00:00sunil makkarsunil.makkar@gmail.comYudhvir Singhdr.yudhvirs@gmail.comRajeshwar Singhrajeshwar.rajata@gmail.com<p><strong>Flying Ad Hoc Network is the most suitable and most emerging research topic in the field of wireless communication. Flying ad-hoc network (FANET) is a special class of MANET that provides the communication among small flying drone called UAVs (unmanned aerial vehicle) enable with camera, sensor and communication system. FANET has wide area of applications like reconnaissance and surveillance for military and civil purposes. FANETs along with its special features have several challenges and issues those need to be considered. Routing in FANETs is one such issue because all the information exchanging process is done by the Routing protocol. In this experiment, the performance of OLSR and AODV routing protocols are analyzed for 3 D FANET environment by utilizing Gauss Markov Mobility Model. We have investigated the performance of protocols by varying group of UAVs and number of packets. Gauss Markov Mobility model has been used to produced 3 D cube area with dimension 1700x1700x1500 meters. Simulation experiment has been carried out using NS3 network simulator. The metrics used for this investigation are Packet Delivery Fraction, Throughput and Average End-to-End Delay. It has been find out that OLSR is better choice for FANET in term of packet delivery fraction and real time delivery of data.</strong></p>2018-12-05T07:22:25+00:00Copyright (c) 2018 Journal of Communication Engineering & Systemshttps://computerjournals.stmjournals.in/index.php/JoCES/article/view/200A Hybrid voice identification System with Fuzzy Technique and ART2 Neural Network on BPF Technique2020-05-16T09:16:15+00:00Pharindra Kumar Sharmagwalior0312@gmail.comNeeraj Sahugwalior0312@gmail.com<p><strong>Abstract:</strong></p><p>In this work, we evaluate the performance of voice identification through the hybrid method using fuzzy and Adaptive Resonance Theory2. The Voice identification is an important task, which shows the active interaction of natural human-machine, for over last important two decades. The objective of this work, it is consists in working out an identification rate of voice identification. The proposed methodology presented allows evaluating the identification process which considers a voice-to-voice matching system using frequency of any words as “Hello”, “Left”, “Right”, “Up”, “Down”, “On”, “Off”, “Turn-on” and “Turn-off”. The above nine words are used for identification. The inputting voice is taken by microphone under the control condition. This approach used the Audacity and PRAAT software for removing the noise and gated the data for calculation the identification. The overall identification rate of all input words is more than 99% and 3% FAR.</p><p><strong>Keywords:</strong> Voice, FFT, Fuzzy, ART, Signal, Bandwidth.</p>2018-11-05T11:05:59+00:00Copyright (c) 2018 Journal of Communication Engineering & Systemshttps://computerjournals.stmjournals.in/index.php/JoCES/article/view/33Cloud Based Pool Water Monitoring System using Internet of Things2020-05-16T08:35:06+00:00Aditya Sainirohit.samkaria93@gmail.comKrishan Kumar Nagalrohit.samkaria93@gmail.comRohit Samkariarohit.samkaria93@gmail.comRajesh Singhrohit.samkaria93@gmail.comAnita Gehlotrohit.samkaria93@gmail.comSushabhan Choudharyrohit.samkaria93@gmail.com<p>The Internet of Things has a concept where internet extends into actual world grasping to daily objects. The IoT gives the power to sense and control these objects over existing network. This gives rise to alliance between physical world and computer based platforms. The results of this alliance are higher accuracy, improved efficiency, reduced economical cost and less human involvement. This technology has produced smart cities, smart homes, advanced healthcare and smart swimming pools etc. The proposed system refers to remotely measuring and controlling swimming pool conditions using WSN and IoT. The monitoring is done by using Arduino and Wasp mote smart meter framework. This smart monitoring displays the water quality, presence of person, pet, object in pool, etc.</p><p>Cite this Article<br />Aditya Saini, Krishan Kumar Nagal, Rohit Samkaria, et al. Cloud Based Pool Water Monitoring System Using Internet of Things. Journal of Communication Engineering & Systems. 2018; 8(1): 1–7p.</p>2018-06-19T07:16:02+00:00Copyright (c) 2018 Journal of Communication Engineering & Systemshttps://computerjournals.stmjournals.in/index.php/JoCES/article/view/38IoT and XBee Based Smart Traffic Management System2020-05-16T08:35:24+00:00Riya Goyalsanriya1520@gmail.comAmisha Kumarisanriya1520@gmail.comKumar Shubhamsanriya1520@gmail.comNishant Kumarsanriya1520@gmail.com<p>10 min hunting down for car parking a few times, day by day implies over 240 h for each year, and a normal of 700 finish days in your life. Driving around searching for an available parking slot squanders fuel, produces uneasiness and increases pollution in city centers. The principle objective of this venture is to make traffic more fluid and increase at parking spots close to the crowded areas such as shopping malls, hospitals, movie theaters etc. In order to deal with the scenario of traffic congestion, a system is designed that gathers parking spot availability data while driving by. This data is available on smart phones or on the display screen of the parking lot. The outcome of this system is to relieve congestion, streamline traffic, and improve access to car park areas.</p><p>Cite this Article<br />Riya Goyal, Amisha Kumari, Kumar Shubham, et al. IoT and XBee Based Smart Traffic Management System. Journal of Communication Engineering & Systems. 2018; 8(1): 8–14p.</p>2018-06-19T07:16:02+00:00Copyright (c) 2018 Journal of Communication Engineering & Systemshttps://computerjournals.stmjournals.in/index.php/JoCES/article/view/50A Review on Parasitically Coupled and a Direct Coupled Feed for a Microstrip Antenna Array2020-05-16T08:35:50+00:00A. S. Wakhureaswakhure@rediffmail.comS. P. Khardeaswakhure@rediffmail.com<p>Due to modern electronics, small size electronic systems have been increasing in integrated circuits and the physical size of systems is reduced. Hence, demand of small and low cost antennas has increased. Microstrip or patch antenna provides the lightweight, not expensive, and integration is easy. Microstrip antennas or patch antennas are one of the most attractive antennas for integrated systems and are widely used in wireless communication systems. This paper provides the review on parasitically as well as direct coupled feed for a microstrip antenna array.</p><p>Cite this Article Wakhure AS, Kharde SP. A Review on Parasitically Coupled and a Direct Coupled Feed for a Microstrip Antenna Array. Journal of Communication Engineering & Systems. 2018; 8(1): 15–18p.</p>2018-06-19T07:16:02+00:00Copyright (c) 2018 Journal of Communication Engineering & Systemshttps://computerjournals.stmjournals.in/index.php/JoCES/article/view/47OQPMSAV: Opportunistic Quality of Services Provisioning for Multimedia Services using Artificial Neural Network2020-05-16T08:37:19+00:00Upendra Dwivediud1985@gmail.comAkhilesh R. Upadhyayud1985@gmail.com<p style="margin-left: 1.27cm; margin-right: 1.27cm; margin-bottom: 0cm; line-height: 100%;" align="justify"><span style="color: #000000;"><span style="font-family: Times New Roman,serif;"><span style="font-size: small;"><em>Vehicular ad hoc network is used to provide services related to traffic safety and user requirements. In VANET, applications are designed for users from various domains automobile company, road safety authority, advertisement industries, personal entertainment. Applications developer requires efficient utilization of available networking resources. VANET is witnessed of continuous support form researchers, developer, government authorities and vehicles manufactures. In VANET, vehicles are designed to move at high speed which causes more frequent disruption for data communication. Frequent loss of wireless communication link and outdated routes are common phenomenon. Applications in VANET are classified into safety and non-safety messages. In this research work, we have focused on multimedia applications requirements and reliable delivery of multimedia messages in VANET. An adaptive mechanism is proposed to provide QoS provisioning for multimedia applications. Artificial neural network is used to estimate requirements for applications andenhancevehicular network wireless communication efficiency. OQPMSAV is designed to provide reliable multimedia services delivery in high vehicular mobility and frequent disruption in wireless links. Vehicles in Network Simulation (Veins) simulation tool and Simulation of Urban Mobility (SUMO) are used for simulation experiments. Simulation experiments are performed for analyzing OQPMSAV for successful delivery of multimedia messages in different scenarios. Simulation results show that OQPMSAV provides reliable and timely delivery of multimedia services in terms of successful packet delivery ratios. </em></span></span></span></p><p style="margin-left: 1.27cm; margin-right: 1.27cm; margin-bottom: 0cm; line-height: 100%;" align="justify"> </p><p style="margin-left: 1.27cm; margin-right: 1.27cm; margin-bottom: 0cm; line-height: 100%;" align="justify"><span style="color: #000000;"><span style="font-family: Times New Roman,serif;"><span style="font-size: small;"><em><strong>Keywords:</strong></em></span></span></span><span style="color: #000000;"><span style="font-family: Times New Roman,serif;"><span style="font-size: small;"><em>Vehicular ad hoc Networks (VANETs);IEEE 802.11p;Quality of Service; Artificial Neural Network; OMNeT++; Veins; SUMO</em></span></span></span></p><p style="margin-left: 1.27cm; margin-right: 1.27cm; margin-bottom: 0cm; line-height: 100%;" align="justify"> </p><p style="margin-left: 1.27cm; margin-right: 1.27cm; margin-bottom: 0cm; line-height: 100%;" align="justify"><strong>Cite this Article</strong><br />UpendraDwivedi, Akhilesh R. Upadhyay. Opportunistic Quality of Services Provisioning for Multimedia Services using Artificial Neural Network. Journal of Communication Engineering & Systems. 2018; 8(1): 25–38p.</p><p style="margin-left: 1.27cm; margin-right: 1.27cm; margin-bottom: 0cm; line-height: 100%;" align="justify"> </p>2018-06-19T07:16:02+00:00Copyright (c) 2018 Journal of Communication Engineering & Systemshttps://computerjournals.stmjournals.in/index.php/JoCES/article/view/74Design and Simulation of FIR Filter using VHDL2020-05-16T08:36:25+00:00Adesh Kumaradeshmanav@gmail.com<p style="margin-left: -1cm; margin-right: -1.08cm; margin-bottom: 0.28cm; line-height: 100%;" align="justify"><span style="font-family: Times New Roman,serif;"><span style="font-size: medium;">Digital Signal Processing</span></span><span style="font-family: Times New Roman,serif;"><span style="font-size: medium;"><strong> (</strong></span></span><span style="font-family: Times New Roman,serif;"><span style="font-size: medium;">DSP) has gained great popularity in the recent years. DSP is used in the field of communication, medicine and entertainment. Earlier the digital signals use is expensive in the communication devices. DSP makes use of the digital filters in the communication equipment. The basic building block of the digital filter-adder, coefficient multipliers and delays. Digital filter can be implemented efficiently by selecting an efficient representation for filter coefficient. Finite Impulse Response (FIR) filter is the important part in the high speed digital processing and video processing. The research work mainly focuses on the FIR filter design and its implementation on Field Programmable Gate Array (FPGA) In out design, the filter takes x(n) and w(n) inputs of length 4 each and gives y (n) as outputs for the x (n) inputs of coefficient of order 4. A 7-tap filter is designed using the x (n) and w (n) as the input where w (n) is the delayed input to the filter. The output generated is generally a convolution sum of x (n) and w (n). For the designing of an optimum filter area, frequency, speed of operation and hardware requirement are the main aspects to focus. The implementation of the 7-tap FIR filter is done using the Xilinx software using the VHDL language. </span></span></p><p style="margin-left: -1cm; margin-right: -1.08cm; margin-bottom: 0.28cm; line-height: 100%;" align="justify"><span style="font-family: Times New Roman,serif;"><span style="font-size: medium;"><strong>Keywords- </strong></span></span><span style="font-family: Times New Roman,serif;"><span style="font-size: medium;">Digital Signal Processing</span></span><span style="font-family: Times New Roman,serif;"><span style="font-size: medium;"><strong> (</strong></span></span><span style="font-family: Times New Roman,serif;"><span style="font-size: medium;">DSP), Finite Impulse Response (FIR) filter, Field Programmable Gate Array (FPGA), Very High Speed Integrated Circuit Hardware Description Language (VHDL)</span></span></p>2018-06-19T07:16:02+00:00Copyright (c) 2018 Journal of Communication Engineering & Systemshttps://computerjournals.stmjournals.in/index.php/JoCES/article/view/48Evolution Of Cellular Technology- 1G To 4G And Beyond2020-05-16T08:37:49+00:00Tulikapriya Sinhatulikapriya.sinha@gmail.comThis paper deals with the advancements in the wireless communication technologies and its evolution over the recent dynamic times. Cellular technologies have undergone a transition from a restricted local communication in the early stages to extremely fast global communication enabler. The First Generation provided basic voice communication limited within a particular region at relatively low speed. The Second Generation underwent a transformation with respect to speed, network security and inclusion of data services on a global platform. Third Generation provided better interoperability, focusing on cost and data rates, promoting communication over internet protocols, and backward compatibility. The Fourth Generation enhanced data rates with a wise use of spectrum, better roaming flexibility and user-friendly services. As the technology progressed, the affinity towards digital communication increased providing promising services with better longevity, dynamic technologies, and support to killer applications.2018-06-19T07:16:02+00:00Copyright (c) 2018 Journal of Communication Engineering & Systemshttps://computerjournals.stmjournals.in/index.php/JoCES/article/view/64EXPLORING BODY TO BODY COMMUNICATION USING HEALTH MONITOR APPLICATION2020-05-16T08:37:57+00:00Gokilamani D.Smanigokila@gmail.com<strong>The paper presents a Advanced technology of communication method called as body to body communication in biomedical field. Human body is used as a medium of transmission of data. The use of this technology in medical monitoring systems eliminates the complexity of existing technologies that involves cables wires for transmission of data. The proposed model provides a secure and simple communication system that consists of wearable devices to measure heart beat and temperature and hence transmits the data from patient to the master doctor in real time and used to maintaining the patient health report simultaneously. The model, wearable on wrist or any other part of the body has an integrated processor ARM7 Thus the proposed methodology of using human body enhances the security of transmitted signals as compared to the other wireless technologies.</strong>2018-06-19T07:16:02+00:00Copyright (c) 2018 Journal of Communication Engineering & Systemshttps://computerjournals.stmjournals.in/index.php/JoCES/article/view/86AODV Routing Protocol for Congestion Control Based on Packet Priority2020-05-16T08:38:20+00:00Dinesh Kumar Ndinuhai@yahoo.co.in<p class="western" style="margin-left: 1.27cm; margin-right: 1.27cm; margin-bottom: 0cm; line-height: 101%;" lang="en-US" align="justify"><span style="font-family: Times New Roman,serif;"><em>There is a requirement for permitting customer prioritization, i</em></span><span style="font-family: Times New Roman,serif;"><em>n wireless multimedia streaming;</em></span><span style="font-family: Times New Roman,serif;"><em> so, arrangement of end client can be empowered with a good quality in-coordinate association with other client devices consequence. As of now, a similar </em></span><span style="font-family: Times New Roman,serif;"><em>priority</em></span><span style="font-family: Times New Roman,serif;"><em> is given to all clients, autonomous of their attributes, regularly bringing about unfair dispersion of throughput. This paper proposes a need based plan for QoS in MANET by classifying the activity stream into various priority classes, and giving distinctive treatment to stream having a high priority flow and still accomplish most ideal throughput.</em></span><span style="font-family: Times New Roman,serif;"><em>The aim is to lessen the impact of dependence between routes utilized by high and low priority movement. T</em></span><span style="font-family: Times New Roman,serif;"><em>he shortest path will be chosen by AODV protocol for high priority traffic and diver</em></span><span style="font-family: Times New Roman,serif;"><em><span style="background: #00ffff;">t</span></em></span><span style="font-family: Times New Roman,serif;"><em> the route for low priority traffic that will minimally interface with high priority flow, thus </em></span><span style="font-family: Times New Roman,serif;"><em>decreasing the impact of coupling amongst high and low </em></span><span style="font-family: Times New Roman,serif;"><em>priority routes.</em></span></p><p class="western" style="margin-left: 1.27cm; margin-right: 1.27cm; margin-bottom: 0cm; line-height: 101%;" lang="en-US" align="justify"> </p><p class="western" style="margin-left: 1.27cm; margin-right: 1.27cm; margin-bottom: 0cm; line-height: 101%;" lang="en-US" align="justify"><span style="font-family: Times New Roman,serif;"><em><strong>Keywords</strong></em></span><span style="font-family: Times New Roman,serif;"><em>: AODV, MANET, multimedia, priority, QoS, throughput</em></span></p>2018-06-19T07:16:02+00:00Copyright (c) 2018 Journal of Communication Engineering & Systemshttps://computerjournals.stmjournals.in/index.php/JoCES/article/view/14Consistent Tracking of Goods Throughout the Transportation Chain Based on Internet of Things and Wireless Sensor Network2020-05-16T08:26:16+00:00Akash Kumar Singhrohit.samkaria93@gmail.comNitin Karnatakrohit.samkaria93@gmail.comRohit Samkariarohit.samkaria93@gmail.comRajesh Singhrohit.samkaria93@gmail.comAnita Gehlotrohit.samkaria93@gmail.comSushabhan Choudharyrohit.samkaria93@gmail.com<p>Consistent tracking of goods throughout the transportation process is a critical task for cargo-owners, transportation companies and the receiver customers who would get their desired belongings. In this paper, we have proposed a Wireless Sensor Network and cloud server based goods consistent tracking system throughout the transportation chain. Our purposed system does not only monitor the status of the transport vehicle by Waspmote mounted on it, but it has smart sensors placed on cargo inside the vehicle to give periodic data about their location by comparing it with the pre-planned route and to give signal in case the cargo broke or of their attempted theft.</p><p> </p><p><strong>Cite this Article</strong><br />Akash Kumar Singh, Nitin Karnatak, Rohit Samkaria et al. Consistent Tracking of<br />Goods Throughout the Transportation Chain Based on Internet of Things and<br />Wireless Sensor Network. Journal of Communication Engineering & Systems.<br />2017; 7(3): 36–44p.</p>2018-01-31T06:29:04+00:00Copyright (c) 2018 Journal of Communication Engineering & Systemshttps://computerjournals.stmjournals.in/index.php/JoCES/article/view/21REDUCING BASE STATION POWER CONSUMPTION2020-05-16T08:26:03+00:00Pooja Ashok Vairagadepveenavairagade@gmail.comPranali R. Dandekarpveenavairagade@gmail.comMegha Shrawanji Meshrampveenavairagade@gmail.com<p>As power consumption is becoming a key issue in mobile communication and the heart of mobile communication is Base Station. This paper concentrates on reducing BS power consumption by using three basic power saving mechanisms: sleep mode, discontinuous transmission and antenna adaptation. This algorithm concentrates on reducing power consumption for MIMO-OFDM. Simulations results state that the proposed algorithm is capable of reducing BS power consumption significantly.</p><p><strong>Cite this Article</strong><br />Pooja Ashok Vairagade, Dandekar Pranali R, Megha Shrawanji Meshram. Reducing<br />Base Station Power Consumption. Journal of Communication Engineering & Systems. 2017; 7(3): 21–35p.</p>2018-01-24T04:44:24+00:00Copyright (c) 2018 Journal of Communication Engineering & Systemshttps://computerjournals.stmjournals.in/index.php/JoCES/article/view/16Effect of EM Wave from Mobile Phone on Skin Depth in Human Blood, Bone and Muscle2020-05-16T08:25:49+00:00M. Usha Raniusha.rani1991@gmail.comV.S.S.N. Srinivasa Babausha.rani1991@gmail.comSrivalli Gundalausha.rani1991@gmail.com<p><em>Cell phone technology has become an integral part of day to day life and it is used not only for voice messages but also for high resolution pictures and mainly the use of Internet. When cell phones are placed near to human body, the EM radiations emitted from the phone penetrate deep inside the body. The present paper investigations have been made to estimate skin depth of electromagnetic radiations inside human blood, muscle and bone as a function of frequency for different cellular frequency bands, 800–900 MHz, 1800–1900 MHz and 2300–2450 MHz, respectively. Results are obtained for different conductivities, resistivity values, and permeability at the above frequency bands for blood, muscle and bone and are presented in this paper.</em></p><p class="Articletitle"><strong>Cite this Article</strong></p><p class="Articletitle"><strong></strong>Usha Rani M, Srinivasa Baba VSSN, Srivalli Gundala. Effect of EM Wave from Mobile Phone on Skin Depth in Human Blood, Bone and Muscle. <em>Journal of Communication Engineering & Systems. </em>2017; 7(3): 16–20p.</p><p><em><br /></em></p><p><strong><em> </em></strong></p>2018-01-20T04:40:50+00:00Copyright (c) 2018 Journal of Communication Engineering & Systemshttps://computerjournals.stmjournals.in/index.php/JoCES/article/view/18Phase Noise Reduction in WLAN by Applying Wavelet Packet Multiplexing2020-05-16T08:25:41+00:00Govinda Raju M.govindarajum@rvce.edu.inUma B. V.govindarajum@rvce.edu.in<p>The IEEE 802.11 standards for wireless Local Area Networks (LANs) commercialized as Wi-Fi are deployed in office and home environments. These systems provide data rates up to 1300 Mbps at 5 GHz and 400 Mbps at 2.4 GHz with physical layer based on OFDM and MIMOOFDM. Traditionally, multiplexing in OFDM is realized using static orthogonal waveforms derived from Fourier transforms. The decoding of the data at receiver is based on preserving<br />orthogonality among the subcarriers. However, there are many transmission impairments which lead to reduction of autocorrelation among subcarriers resulting in interference. The impairments of RF circuits impose a limit on high data rate that a system can achieve. Due to long symbol period, OFDM is sensitive to phase noise of the oscillator resulting in increase of cross correlation among the waveforms used for multiplexing. In this paper, realization of WLAN multiplexing using classical flexible orthogonal wavelet packets to improve the BER performance in the presence of phase noise on AWGN channel is considered. The construction framework to design orthogonal wavelets which are optimized to reduce phase offset error is presented. The designed optimal wavelet bases perform better in the presence of phase noise with additional time complexity.</p><p><strong>Cite this Article</strong><br />Govinda Raju M, Uma BV. Phase Noise Reduction in WLAN by Applying Wavelet<br />Packet Multiplexing. Journal of Communication Engineering & Systems. 2017; 7(3): 8–15p.</p>2018-01-04T10:42:39+00:00Copyright (c) 2018 Journal of Communication Engineering & Systemshttps://computerjournals.stmjournals.in/index.php/JoCES/article/view/2Design and Performance Analysis of an UWB Wearable Patch Antenna for WBAN Applications2020-05-16T08:25:24+00:00G. Mollahgloriamollah@gmail.comFarhadur Arifingloriamollah@gmail.com<p><span><span style="color: #000000;"><span><em>In this paper we represent an ultra-wide band wearable textile antenna for body area network. The proposed antenna consists of a decagonal radiating patch and a partial ground plane with a square slot. For textile antenna, the textile materials and the planer shapes provide a smooth integration into clothing while preserving the characteristic properties of the textile. The ultra-wide band for these types of antenna is achieved by optimizing the geometry and by introducing a square slot on the ground plane and E shaped slot in the radiating patch. The volume of the proposed antenna is 2656.8 mm</em></span></span><span style="color: #000000;"><sup><span><em>3</em></span></sup></span><span style="color: #000000;"><span><em> and the bandwidth is 16.43 GHz from 3.37 to 19.8 GHz. The minimmum return loss, S</em></span></span><span style="color: #000000;"><sub><span><em>11 </em></span></sub></span><span style="color: #000000;"><span><em>is found –40.8 dB at 4.55 GHz. The design details and the simulated results are presented by commercial electromagnetic simulation package CST Microwave Studio 2015.</em></span></span></span></p><p> </p><p><span style="color: #000000;"><span><strong>Cite this Article</strong></span></span></p><p> </p><p><span style="color: #000000;"><span>Mollah G, Farhadur Arifin. Design and Performance Analysis of an UWB Wearable Patch Antenna for WBAN Applications. </span><span><em>Journal of Communication Engineering & Systems</em></span><span>. 2017; 7(3):</span></span></p><p><span><span style="color: #000000;"><span><em><br /></em></span></span></span></p><p><span style="color: #000000;"><em><strong>Keywords: </strong></em></span><span style="color: #000000;"><em>Ultra-Wide Band, wearable textile antenna, partial ground plane</em></span></p>2017-12-11T04:37:12+00:00Copyright (c) 2017 Journal of Communication Engineering & Systems