3. Book Chapters
Permanent URI for this collectionhttps://idr.nitk.ac.in/handle/1/8
Browse
6 results
Search Results
Item Techniques to improve gain-bandwidth 5g ics(2021) Vignesh R.; Kumar R.; Song H.; Kumar S.This chapter introduces a basics of designs and techniques to improve gain-bandwidth for 5G ICs. The major focus would be on the various network topologies that yield to provide easy implementation of on-chip components for 5G-ICs. Section 1 discusses the basics of RLC tank networks, which includes RC parallel network, RLC network and series to parallel resonant network. The parameters such as quality factor, noise of filter networks are shortly refresh while foundation of resonant circuits would set-up for 5G transceiver ICs. Section 2 introduces coupled resonator networks can be used as microwave components to achieve a better gain-bandwidth trade-off. Finally, Sect. 3 will provide transformer resonators and circuit to reduce bulky components and enhance gain-bandwidth of ICs. © Springer Nature Singapore Pte Ltd. 2021.Item Mm-wave cmos power amplifiers for 5g(2021) Gorre P.; Kumar R.; Song H.; Kumar S.The chapter discusses the basic elements in the design of mm-wave CMOS Power Amplifier (PA) for phased arrays integration, focusing the next-generation 5G mobile communication. Power Amplifier design metrics, along with implementation of beam-forming phased arrays to merge power over-the-air are discussed in brief. The explanation begins with CMOS unique advantages, real-time handset challenges, system-level constraints, and design challenges are conceptually demonstrated with the help of a basic single-stage transistor Power Amplifier. © Springer Nature Singapore Pte Ltd. 2021.Item Distributed Cloud Deep Learning Architecture for Complex Image Analysis and Run-time Prediction Tool(2021) Kumar S.; Thomas E.; Horo A.; Annappa B.Hyperspectral imaging is a rare research tool and has been transformed into a commodity product found in a wide field. Currently, standard data processing methods that specialize in special hyperspectral accumulation structures are required. Also, with the advent of data collection and development in the field of sensory devices, it has rendered previous processing tools in vain. To manage this huge increase in the amount of data, a consistent cloud distribution method is required. Hyperspectral images (HSIs) have several spectral band channels that make the study very difficult. In this paper, an in-depth reading method of the novel with a modified autoencoder is proposed as a cloud-based use of HSI analysis, which provides a measure of lesser error rates and high accuracy of classification models. In line with this, a list of four tools has been proposed to calculate the actual number of workers, cores, and iterations required to achieve the desired accuracy for a specified amount of run-time. This will help cloud managers get a basic idea of computational needs and help them allocate resources more efficiently. The entire architecture was simulated on Spark servers and was verified experimentally by checking that the proposed architecture performs the function of efficient management and analysis of large HSI. © 2021, The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.Item Mechanical properties of pavement quality concrete produced with reclaimed asphalt pavement aggregates(2019) Panditharadhya B.J.; Mulangi R.H.; Ravi Shankar A.U.; Kumar S.Production of conventional coarse aggregates for concrete works is getting difficult because of depleting natural resources and environmental ill effects. Reclaimed Asphalt Pavement (RAP) aggregates, which are produced from asphalt waste generated during removal of flexible pavement. The disposal problems of asphalt waste generated is also addressed with this step. The properties of RAP aggregates may vary with the source of waste generation and the age of the asphalt. This study is taken up to determine the strength characteristics of pavement quality concrete produced with RAP aggregates produced with asphalt waste generated at local road construction site. Properties such as compression strength, elastic modulus, flexural strength, split tensile strength, and water absorption were determined for the specimen with varying percentage of RAP replacement. The asphalt waste was processed further with screening to obtain the required gradation. RAP aggregates were replaced with conventional aggregates by 20, 40, 60, 80, and 100%. Mix with 60% conventional granite aggregates and 40% RAP aggregates was found to satisfy the requirements of M30 grade concrete that can be used for producing concrete for constructing the roads with lower traffic volume. © Springer Nature Singapore Pte Ltd. 2019.Item Storage and transmission of cardiac data with medical images(2007) Acharya U.R.; Bhat P.S.; Niranjan U.C.; Kumar S.; Kannathal N.; Min L.C.; Suri J.S.The landscape of healthcare delivery and medical data management has significantly changed over the last years, as a result of the significant advancements in information and communication technologies. Complementary and/or alternative solutions are needed to meet the new challenges, especially regarding security of the widely distributed sensitive medical information. Digital watermarking is a technique of hiding specific identification data for copyright authentication. The DICOM standard is one method to include demographic information, such as patient information and X-ray exposure facilities, in image data. The DICOM standard is a standard that can be used regularly to record demographic information onto the image data header section. Regarding DICOM format images, information on patients and X-ray exposure facilities can be obtained easily from them. On the other hand, general-purpose image formats, such as the JPEG format, offer no standard that can be used regularly to record demographic information onto the header section. Digital watermark technologies [1-8] can be used to embed demographic information in image data. Digital watermarking have several other uses, such as fingerprinting, authentication, integrity verification purposes, content labeling, usage control and content protection [9, 10]. The efficient utilization of bandwidth of communication channel and storage space can be achieved, when the reduction in data size is done. Recently, Giakoumaki et al, have presented a review of research in the area of medical-oriented watermarking and proposed a wavelet-based multiple watermarking scheme. This scheme aimed to address critical health information management issues, including origin and data authentication, protection of sensitive data, and image archiving and retrieval [11]. Their experimental results on different medical imaging modalities demonstrated the efficiency and transparency of the watermarking scheme. The digital watermarking technique is adapted in this chapter for interleaving patient information with medical images, to reduce storage and transmission overheads. The text data is encrypted before interleaving with images to ensure greater security. The graphical signals are compressed and subsequently interleaved with the image. Differential pulse code modulation and adaptive delta modulation techniques are employed for data compression as well as encryption and results are tabulated for a specific example. Adverse effects of channel induced random errors and burst errors on the text data are countered by employing repetition code, Hamming code and R-S code techniques.Item Security issues in mobile ad hoc networks: A survey(2015) Kumar S.; Dutta K.A Mobile Ad hoc NETwork (MANET) is a self-organizing, infrastructure-less network of mobile nodes connecting by wireless links. In operation, the nodes of MANETs do not have a central control mechanism. It is known for its properties of routable network, where each node acts as a router to forward packets to other specific nodes in the network. The unique properties of MANET have made it useful for large number of applications and led to a number of security challenges. Security in the mobile ad hoc network is a very critical job and requires the consideration of different security issues on all the layers of communication. The countermeasures are the functions that reduce or eliminate security vulnerabilities and attacks. This chapter provides a comprehensive study of all prominent attacks in Mobile Ad Hoc Networks described in the literature. It also provides various proactive and reactive approaches proposed to secure the MANETs. Moreover, it also points to areas of research that need to be investigated in the future. © 2016, IGI Global. All rights reserved.