Broadband Microstrip Yagi Array Antenna for S-C Band Application
This paper presents an optimum design technique of broadband two elements Yagi array antenna. The optimization parameter for the proposed antenna is the impedance bandwidth using appropriate dimensions of ground plane and in Yagi array, dipole is replace by patch, all element design in form patch. In this paper we observed effect with and without ground plane on impedance bandwidth. Appropriate Spacing is used between elements; all elements designed on scale of reflector, the proposed antenna can be used for C-Band application. For validation of proposed geometry IE3D Simulator is used.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
Chaos image encryption using pixel shuffling with henon map
The advent of wireless communications both inside and outside the home-office environment has led to an increased demand for effective encryption systems. The beauty of encryption technology comes out in more pronounced way when there is no absolute relation between cipher and original data and it is possible to rebuild the original image in much easier way. As chaotic systems are known to be more random and non-predictable, they can be made utilized in achieving the encryption. The transposition technology of encryption systems requires scrambleness behaviour in order to achieve the encryption of the data. This srambleness behaviour can be derived from the randomness property of chaos which can be better utilized in the techniques like transposition system. In wireless communication systems, bandwidth utilization is an important criterion. In order to use encryption system in wireless communication; key space plays an important role for the efficient utilization of the bandwidth. In this paper we present a chaos-based encryption algorithm for images. This algorithm is based on pixel scrambling where inthe randomness of the chaos is made utilized to scramble the position of the data. The position of the data is scrambled in the order of randomness of the elements obtained from the chaotic map and again rearranged back to their original position in decryption process.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
Comparison of Lumped & Wave Port in Microstrip Antenna for Detecting Breast Tumor
With the rapid increase in number of women suffering from breast cancer, it’s early detection aids in fast and effective treatment. Mammography, which is currently the most popular method of breast screening has some limitation and microwave imaging offers an attractive alteration. Microwave imaging is attractive due to high contrast in dielectric properties between cancerous and non-cancerous tissue. The paper presents different type of feeding mechanism to the micro strip patch antenna used in microwave imaging and its comparison in an urge of getting an ultra-wide band of 3GHz within the frequency range of 3.2 GHz to 10.6 GHz. The antenna is Designed and simulated using Ansoft High Frequency Structure Simulator (HFSS)
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
Cultural impact on female entrepreneurship in Lahore
The aim of this paper is to inspect the dares of female entrepreneurship in Lahore (n=150). Through a questionnaire, major obstacles are found among women on jobs and those who running their traditional business like; boutiques, parlor and embroidery. Descriptive analysis and Factor Analysis Model is used for data analysis. The results are proposed that females want to work and can manage their business self-sufficiently but due to social culture issues they are not taking any initiative to start a new business. Government does not support the female’s entrepreneurship and does not take action for providing the basic education to the females. The female entrepreneurship development is not only due to dearth of financial resources but also lack awareness for facilities available to develop their skills.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
DC-DC Converter Fed Maximum Power Modeling and Simulation of Distributed Generation for Photovoltaic Applications
This paper proposes Artificial Neural Network (ANN) model for the required DC-DC Converter Duty Cycle feeding Maximum Power to resistive load to be used for distributed generation (DG) applications. It proposes a PV module when coupled to a load through DC-DC Converter to supply this resistive load with the maximum power from the PV module. Some of DC-DC converters topologies are discussed in brief with concentration on Cúk and SEPIC Converters operations. The mechanism of load matching is described to give the required converter duty cycle at maximum power point (MPP). Relations in 3D figures are introduced for the most probable situations for irradiance and temperature with the corresponding PV voltage and current. Also, 3D figures for the desired duty cycle, output voltage and current of DC-DC converter to gain the maximum power to the resistive load at various irradiance and temperature values. Moreover; Artificial Neural Network (ANN) is used to implement a neural model with its algebraic function to take the probable system situations and outs the proposed converter duty cycle to give maximum power for the load. All the neural model are done with their hidden and output layers’ suitable neurons numbers and suitable performance goals depending on the 3D simulation figures shown in the paper.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
Detection of the vapor benzene composition formed inside the car cabin
The detection of benzene vapor composition formed inside the cars cabin has been investigated. Benzene is an organic chemical compound. The sample of benzene vapor composition is taken from a cars cabin and then the samples are analyzed by the gas chromatography-mass spectrometer (GCMS). The data is recorded and plotted by using the 4000 GCMS version 6’s software. Finally, the results show that there are different gases compositions inside the cars cabin. Beside of the gas (Z)-1-(Ethoxycarbonyl-1-Fluoro-2-(Methoxycarbonyl)-1, 3-Butadiene, that found inside the cars cabin, there are other gases as - (3-Oxo-3H-Benzo [F] Chromen-2-Yl)-2, 4(1H,3H) - Quinolinedione, Ethane-D6, Ethylene-D4, Heptacosafluoro-Tributylamine, Nonanal, Decanal, Tetradecanoic Acid, 11-Dodecen-1-Al, benzeneethanamine, 3-fluoro-a, 5-dihydroxy-N-methyl-, 2-Pyridinepropanoic Acid, a-Methyl-a-Oxo-Ethyl Ester, Silane Methyl-, Hexadecanoic Acid.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
Determination of sea-level rise in cape coast, Ghana using extreme value theory
There has been growing concern about global sea-level rise and its impacts on mankind. This work therefore focuses on analyzing sea level data of Cape Coast Sea by employing conventional methods of time series analysis and extreme value theory. The study seeks to find out if there is any significant rise in the sea levels of the Cape Coast Sea that will cause flooding of the town and to make recommendations as to whether resettlement issues should be considered. The exploratory analysis reveals that the sea levels of the Cape Coast Sea are characterized by trend and seasonality. The conventional approach of analyzing the sea level data considered sitting a trend model, trend plus seasonal model, a quadratic trend model and a quadratic plus seasonal model to the sea levels of the Cape Coast Sea. The analysis reveals that the fluctuations in the sea levels of the Cape Coast Sea could best be modeled by a trend plus seasonal model. The estimated parameters of the model reveal a highly significant and positive trend in the sea levels of the Cape Coast Sea, and if this trend continues it will have serious implication for the flooding of the town. The extreme value approach in analyzing the sea levels of the Cape Coast Sea considered sitting a General Extreme Value (GEV) distribution model to the annual maxima sea levels (block maxima approach) and the Generalized Pareto Distribution (GPD) model (threshold model). The fitted GEV distribution that changes linearly in the location parameter(µ (t)) is reasonable in modeling the annual maximum sea levels of the Cape Coast sea levels and this supports the fact that the annual maximum sea levels increases over time. The GPD model on the other hand does not support a linear trend in the scale parameter (?(t)). On a whole, the estimated parameters of both models show an increase in the sea levels, and this is significant for the flooding of the town.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
Digitalized terrorism -the technological advancement of crime
'The start of new century may have seen a decline in the number of incidents of 'traditional' terrorism such as hijackings and kidnappings but the lethality of the terrorist potential has risen to a frightening degree with the advent of digitalized terrorism , and its links to computer technology. The vulnerability of the critical infrastructure has led to increasing concern that it will be the target of terrorist attacks. In this highly topical study the authors examine the new terrorist tools and their appalling capacity for the destruction of human systems. The authors claim that the technological revolution has effectively 'democratized' computer knowledge so that the forces of law and order no longer have an inherent advantage of power and privilege. Their special challenge in the new century will be to match the resourcefulness and ingenuity of their terrorist adversaries. The purpose of this paper is to explore how the Internet is altering the traditional concept of terrorism. What are the common Ways of terrorists attacks Cyber-terrorism or digitalized terrorism is a catastrophic phenomenon that has not yet attracted the attention of the Indian Legislature exhaustively. The paper consider whether there is a need to react to digitalized terrorism and if so, to what extent?
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
Dr. Manish Kr Singh joined the team of Elixir Editorial Advisory Board from 30th November 2016
We are very happy to announce that from 30th November 2016, Dr. Manish Kr Singh has joined the team of Elixir Editorial Advisory Board. He/She will carry a special responsibility for dealing with manuscripts based on Veterinary sciences. Dr. Manish Kr Singh working as Assistant Professor in Dept. of Instructional Livestock Farm Complex, Khalsa College of Veterinary and Animal Science, Amritsar- 143 002, (Punjab), India. The appointment of Dr. Manish Kr Singh as member Editorial Advisory Board strengthens the links and will make it easier for prospective authors to establish contact with the journal.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
Effect of chosen botanicals on the oviposition deterrence and adult emergence of callosobruchus maculatus (f) (coleoptera: bruchidae)
The pulse beetle, C.maculatus is a major storage pest of stored grains. Different botanicals were evaluated for their bioefficacy against this pest. The present study was undertaken to study the effect of A. indica (L), C. gigantea (L.), O.tenuiflorum (L), P. amarus (linn) and T. purpurea ((L.) Pers.). Oviposition deterrence and adult emergence activity were carried out at three different concentrations (4%, 8% and 12%) on blackgram, Vigna mungo (L.) against C. maculatus. Maximum oviposition deterrence activity was observed in T. purpurea (70.09%) followed by A. indica (69.44%), P.amarus(56.21%), O.tenuiflorum (50.32%) and C.gigantea (39.39%) at higher concentration. Reduction in adult emergence was higher in C. gigantea and O.tenuiflorum (87.85%) treated seeds. The other plant powders also exhibited their higher potential against C. maculatus.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]