Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 30 of 397

Full-Text Articles in Computer Engineering

Process Models Discovery And Traces Classification: A Fuzzy-Bpmn Mining Approach., Kingsley Okoye Dr, Usman Naeem Dr, Syed Islam Dr, Abdel-Rahman H. Tawil Dr, Elyes Lamine Dr Dec 2017

Process Models Discovery And Traces Classification: A Fuzzy-Bpmn Mining Approach., Kingsley Okoye Dr, Usman Naeem Dr, Syed Islam Dr, Abdel-Rahman H. Tawil Dr, Elyes Lamine Dr

Journal of International Technology and Information Management

The discovery of useful or worthwhile process models must be performed with due regards to the transformation that needs to be achieved. The blend of the data representations (i.e data mining) and process modelling methods, often allied to the field of Process Mining (PM), has proven to be effective in the process analysis of the event logs readily available in many organisations information systems. Moreover, the Process Discovery has been lately seen as the most important and most visible intellectual challenge related to the process mining. The method involves automatic construction of process models from event logs about any domain …


A Data Hiding Scheme Based On Chaotic Map And Pixel Pairs, Sengul Dogan Sd Dec 2017

A Data Hiding Scheme Based On Chaotic Map And Pixel Pairs, Sengul Dogan Sd

Journal of Digital Forensics, Security and Law

Information security is one of the most common areas of study today. In the literature, there are many algorithms developed in the information security. The Least Significant Bit (LSB) method is the most known of these algorithms. LSB method is easy to apply however it is not effective on providing data privacy and robustness. In spite of all its disadvantages, LSB is the most frequently used algorithm in literature due to providing high visual quality. In this study, an effective data hiding scheme alternative to LSB, 2LSBs, 3LSBs and 4LSBs algorithms (known as xLSBs), is proposed. In this method, random …


Table Of Contents Mar 2017

Table Of Contents

Journal of Digital Forensics, Security and Law

No abstract provided.


Front Matter Mar 2017

Front Matter

Journal of Digital Forensics, Security and Law

No abstract provided.


Special Issue Of Best Papers From The 11th International Conference On Systematic Approaches To Digital Forensic Engineering (Sadfe 2016) Mar 2017

Special Issue Of Best Papers From The 11th International Conference On Systematic Approaches To Digital Forensic Engineering (Sadfe 2016)

Journal of Digital Forensics, Security and Law

The SADFE series feature the different editions of the International Conference on Systematic Approaches to Digital Forensics Engineering. Now in its eleventh edition, SADFE has established itself as the premier conference for researchers and practitioners working in Systematic Approaches to Digital Forensics Engineering.

SADFE 2016, the eleventh international conference on Systematic Approaches to Digital Forensic Engineering was held in Kyoto, Japan, September 20 - 22, 2016.

Digital forensics engineering and the curation of digital collections in cultural institutions face pressing and overlapping challenges related to provenance, chain of custody, authenticity, integrity, and identity. The generation, analysis and sustainability of digital …


A Forensic Email Analysis Tool Using Dynamic Visualization, Johannes Stadlinger, Andreas Dewald Mar 2017

A Forensic Email Analysis Tool Using Dynamic Visualization, Johannes Stadlinger, Andreas Dewald

Journal of Digital Forensics, Security and Law

Communication between people counts to the most important information of today’s business. As a result, in case of forensic investigations in big companies, analysis of communication data in general and especially email, as the still most widely used business communication platform with an immense and still growing volume, is a typical task in digital forensics. One of the challenges is to identify the relevant communication partners and structures in the suspects surrounding as quickly as possible in order to react appropriately and identify further targets of evaluation. Due to the amount of emails in typical inboxes, reading through all the …


Find Me If You Can: Mobile Gps Mapping Applications Forensic Analysis & Snavp The Open Source, Modular, Extensible Parser, Jason Moore, Ibrahim Baggili, Frank Breitinger Mar 2017

Find Me If You Can: Mobile Gps Mapping Applications Forensic Analysis & Snavp The Open Source, Modular, Extensible Parser, Jason Moore, Ibrahim Baggili, Frank Breitinger

Journal of Digital Forensics, Security and Law

The use of smartphones as navigation devices has become more prevalent. The ubiquity of hand-held navigation devices such as Garmins or Toms Toms has been falling whereas the ownership of smartphones and their adoption as GPS devices is growing. This work provides a comprehensive study of the most popular smartphone mapping applications, namely Google Maps, Apple Maps, Waze, MapQuest, Bing, and Scout, on both Android and iOS. It details what data was found, where it was found, and how it was acquired for each application. Based on the findings, the work allowed for the construction of a tool capable of …


Compression Of Virtual-Machine Memory In Dynamic Malware Analysis, James E. Fowler Ph.D. Mar 2017

Compression Of Virtual-Machine Memory In Dynamic Malware Analysis, James E. Fowler Ph.D.

Journal of Digital Forensics, Security and Law

Lossless compression of memory dumps from virtual machines that run malware samples is considered with the goal of significantly reducing archival costs in dynamic-malware-analysis applications. Given that, in such dynamic-analysis scenarios, malware samples are typically run in virtual machines just long enough to activate any self-decryption or other detection- avoidance maneuvers, the virtual-machine memory typically changes little from that of the baseline state, with the difference being attributable in large degree to the loading of additional executables and libraries. Consequently, delta coding is proposed to compress the current virtual-machine memory dump by coding its differences with respect to a predicted …


Robust Adaptive Fuzzy Control Of A Three-Phase Active Power Filter Based On Feedback Linearization, Shixi Hou, Juntao Fei Jan 2017

Robust Adaptive Fuzzy Control Of A Three-Phase Active Power Filter Based On Feedback Linearization, Shixi Hou, Juntao Fei

Turkish Journal of Electrical Engineering and Computer Sciences

In this paper, a robust adaptive fuzzy control system using feedback linearization is proposed for a three-phase active power filter (APF). The APF system is divided into two separate loops: the current dynamic inner loop and the DC voltage dynamic outer loop. Adaptive fuzzy tracking control using feedback linearization is employed for the current dynamic inner loop to overcome the drawbacks of the conventional method. The proposed controller can ensure proper tracking of the reference current and impose desired dynamic behavior, giving robustness and insensitivity to parameter variations. Adaptive fuzzy proportional-integral control is applied to the DC voltage dynamics outer …


Gica: Imperialist Competitive Algorithm With Globalization Mechanism For Optimization Problems, Yousef Abdi, Mahmoud Lak, Yousef Seyfari Jan 2017

Gica: Imperialist Competitive Algorithm With Globalization Mechanism For Optimization Problems, Yousef Abdi, Mahmoud Lak, Yousef Seyfari

Turkish Journal of Electrical Engineering and Computer Sciences

The imperialist competitive algorithm (ICA) is a recent global search strategy developed based on human social evolutionary phenomena in the real world. However, the ICA has the drawback of trapping in local optimum solutions when used for high-dimensional or complex multimodal functions. In order to deal with this situation, in this paper an improved ICA, named GICA, is proposed that can enhance ICA performance by using a new assimilation method and establishing a relationship between countries inspired by the globalization concept in the real world. The proposed algorithm is evaluated using a set of well-known benchmark functions for global optimization. …


Adaptive Control Of Pure-Feedback Systems In The Presence Of Parametric Uncertainties, Mehrnoosh Asadi, Heydar Toossian Shandiz Jan 2017

Adaptive Control Of Pure-Feedback Systems In The Presence Of Parametric Uncertainties, Mehrnoosh Asadi, Heydar Toossian Shandiz

Turkish Journal of Electrical Engineering and Computer Sciences

The purpose of this study is to investigate an adaptive control approach for completely nonaffine pure-feedback systems with linear/nonlinear parameterization. In this approach, the parameter separation technique and the idea of the positive function of linearly connected parameters are coupled effectively with the combination of backstepping and time-scale separation. Subsequently, a fast dynamical equation is derived from the original subsystem, where the solution is sought to approximate the corresponding ideal virtual/actual control inputs. Furthermore, the adaptation law of unknown parameters can be derived based on Lyapunov theory in the backstepping technique and there is no need to design a state …


An Effective Empirical Approach To Voip Traffic Classification, Nazar Abbas Saqib, Yaqoot Shakeel, Moazzam Ali Khan, Hasan Mehmood, Muhammad Zia Jan 2017

An Effective Empirical Approach To Voip Traffic Classification, Nazar Abbas Saqib, Yaqoot Shakeel, Moazzam Ali Khan, Hasan Mehmood, Muhammad Zia

Turkish Journal of Electrical Engineering and Computer Sciences

It is beneficial for telecommunication authorities and Internet service providers (ISPs) to classify and detect voice traffic. It can help them to block unsubscribed users from using their services, which saves them huge revenues. Voice packets can be detected easily, but it becomes complicated when the application or port information in the packet header is hidden due to some secure mechanism such as encryption. This work provides effective voice packet classification and detection based on behavioral and statistical analysis, which is independent of any application, security protocol, or encryption mechanism. First we have made initial assessments through packet feature analysis …


Dual Broadband Antenna With Compact Double Ring Radiators For Ieee 802.11 Ac/B/G/N Wlan Communication Applications, Meri̇h Palandöken Jan 2017

Dual Broadband Antenna With Compact Double Ring Radiators For Ieee 802.11 Ac/B/G/N Wlan Communication Applications, Meri̇h Palandöken

Turkish Journal of Electrical Engineering and Computer Sciences

In this paper, a dual broadband antenna is proposed for WLAN communication modules supported by the IEEE 802.11 ac/b/g/n standard. The antenna design is based on two interspaced electrically small split-ring resonators, each of which is directly fed through the stepped impedance microstrip line with an optimized electromagnetic coupling distance in between. The proposed dual band antenna operates in the lower frequency band from 2.3 GHz up to 3 GHz with 2.65 GHz center frequency (26.4 % bandwidth) and in the higher frequency band from 4.7 GHz up to 6 GHz with 5.35 GHz center frequency (24.3% bandwidth). The radiating …


Statistical Features-Based Comparison Of Analysis And Synthesis Of Normal And Epileptic Electroencephalograms For Various Wavelets, Revati Shriram, Mahalingam Sundhararajan, Supriya Shete, Nivedita Daimiwal Jan 2017

Statistical Features-Based Comparison Of Analysis And Synthesis Of Normal And Epileptic Electroencephalograms For Various Wavelets, Revati Shriram, Mahalingam Sundhararajan, Supriya Shete, Nivedita Daimiwal

Turkish Journal of Electrical Engineering and Computer Sciences

An electroencephalogram (EEG) is an electrical signal in microvolts captured noninvasively from the brain, which provides important and unique information about the brain. The frequency of an EEG signal lies between 0 and 100 Hz. Decomposition of an EEG signal into various bands such as alpha, beta, delta, theta, and gamma is essential in seizure-related studies. EEGs play a key role in the diagnosis of epileptic seizures and neurological disorders. In this paper, multiple wavelet families for decomposition and reconstruction are explored and are compared based on risk functions and reconstruction measures. While dealing with the wavelets it is a …


Model-Based Fault Analysis Of A High-Voltage Circuit Breaker Operating Mechanism, Ali Forootani, Ali Akbar Afzalian, Ali Nadian Ghohmshe Jan 2017

Model-Based Fault Analysis Of A High-Voltage Circuit Breaker Operating Mechanism, Ali Forootani, Ali Akbar Afzalian, Ali Nadian Ghohmshe

Turkish Journal of Electrical Engineering and Computer Sciences

In this paper, a dynamic model is developed for high-voltage circuit breakers to extract fault features and causes. Lagrange's method is applied using geometric equations of mechanism components to write the model. Unlike previous approaches, the proposed method reveals and analyzes all types of circuit breaker operating mechanism faults. Early fault detection, which is a vital requirement of the fault diagnosis system, becomes feasible by keeping track of changes in the contact travel curve in the proposed model. Resulting faults in the travel curve are analyzed mathematically in order to find out the exact origin of the fault. Field test …


Analysis Of Feature Detector And Descriptor Combinations With A Localization Experiment For Various Performance Metrics, Ertuğrul Bayraktar, Pinar Boyraz Jan 2017

Analysis Of Feature Detector And Descriptor Combinations With A Localization Experiment For Various Performance Metrics, Ertuğrul Bayraktar, Pinar Boyraz

Turkish Journal of Electrical Engineering and Computer Sciences

The purpose of this study is to provide a detailed performance comparison of feature detector/descriptor methods, particularly when their various combinations are used for image-matching. The localization experiments of a mobile robot in an indoor environment are presented as a case study. In these experiments, 3090 query images and 127 dataset images were used. This study includes five methods for feature detectors (features from accelerated segment test (FAST), oriented FAST and rotated binary robust independent elementary features (BRIEF) (ORB), speeded-up robust features (SURF), scale invariant feature transform (SIFT), and binary robust invariant scalable keypoints (BRISK)) and five other methods for …


Analysis And Design Of Grid-Connected 3-Phase 3-Level At-Npc Inverter For Low-Voltage Applications, Emre Avci, Mehmet Uçar Jan 2017

Analysis And Design Of Grid-Connected 3-Phase 3-Level At-Npc Inverter For Low-Voltage Applications, Emre Avci, Mehmet Uçar

Turkish Journal of Electrical Engineering and Computer Sciences

The 3-level T-type neutral point clamped (T-NPC) inverter has become the most popular multilevel inverter used in low-voltage applications. However, the realization of a bidirectional switch located at the midpoint leg of the T-NPC inverter is achieved using two insulated gate bipolar transistors (IGBTs) with two antiparallel diodes. Power dissipation in these switches is high since there are two semiconductors (an IGBT and a diode) in the current path at the midpoint leg. Switch losses can be reduced and thus the highest conversion efficiency can be achieved if the bidirectional switches in the T-NPC inverter are replaced by highly efficient …


Extraction Of Geometric And Prosodic Features From Human-Gait-Speech Data For Behavioral Pattern Detection: Part I, Raj Kumar Patra, Tilendra Shishir Sinha, Ravi Prakash Dubey Jan 2017

Extraction Of Geometric And Prosodic Features From Human-Gait-Speech Data For Behavioral Pattern Detection: Part I, Raj Kumar Patra, Tilendra Shishir Sinha, Ravi Prakash Dubey

Turkish Journal of Electrical Engineering and Computer Sciences

In this work, we extract prosodic features from subjects while they are talking while walking using human-gait-speech data. These human-gait-speech data are separated into 1D data (human-speech) and 2D data (human-gait) using the adaptive-lifting scheme of wavelet transform. We carry out extraction of prosodic features from human-speech data, such as speech duration, pitch, speaking rate, and speech momentum, using five different natural languages (Hindi, Bengali, Oriya, Chhattisgarhi, and English) for the detection of behavioral patterns. These behavioral patterns form real-valued measured parameters, stored in a knowledge-based model called the human-gait-speech model. Extraction of geometrical features from human-gait data, such as …


Two-Group Decodable Distributed Differential Space-Time Code For Wireless Relay Networks Based On Sast Codes, Obada Abdallah, Ammar Abu Hudrouss Jan 2017

Two-Group Decodable Distributed Differential Space-Time Code For Wireless Relay Networks Based On Sast Codes, Obada Abdallah, Ammar Abu Hudrouss

Turkish Journal of Electrical Engineering and Computer Sciences

Space-time code can be implemented in wireless relay networks when all relays cooperate to generate the code at the receiver. In this case, it is called distributed space-time code. If the channel response changes very quickly, the idea of differential space-time coding is needed to overcome the difficulty of updating the channel state information at the receiver. As a result, the transmitted signal can be demodulated without any knowledge of the channel state information at the relays or the receiver. In this paper, development of new low decoding complexity distributed differential space-time codes is considered. The developed codes are designed …


Flexible (2 $\Times $ 1) Mimo Antenna With Electromagnetic Band Gap Unit Cell For Wimax Applications, Hussein Qasim Al-Fayyadh, Abdulghafor Abdulghafar Abdulhameed, Abdulkareem Swadi Abdullah, Haider Mohammed Alsabbagh Jan 2017

Flexible (2 $\Times $ 1) Mimo Antenna With Electromagnetic Band Gap Unit Cell For Wimax Applications, Hussein Qasim Al-Fayyadh, Abdulghafor Abdulghafar Abdulhameed, Abdulkareem Swadi Abdullah, Haider Mohammed Alsabbagh

Turkish Journal of Electrical Engineering and Computer Sciences

A flexible (2 $\times $ 1) multiple-input, multiple-output (MIMO) antenna with an electromagnetic band gap (EBG) unit cell is designed and measured. The proposed MIMO antenna is based on a circular slotted patch antenna to work at 3.5 GHz. An EBG unit cell is used to reduce the effect of the inherent mutual coupling produced between the closely spaced MIMO elements. The results show that the measured mutual coupling has been reduced by -11.6 dB (from -10 dB to -21.6 dB), and the measured realized gain has been increased by 1.074 dBi (from 1.59 dBi to 2.66 dBi). An improvement …


Disk Scheduling With Shortest Cumulative Access Time First Algorithms, Nai̇l Akar, Çağlar Tunç, Mark Gaertner, Fati̇h Erden Jan 2017

Disk Scheduling With Shortest Cumulative Access Time First Algorithms, Nai̇l Akar, Çağlar Tunç, Mark Gaertner, Fati̇h Erden

Turkish Journal of Electrical Engineering and Computer Sciences

A new class of scheduling algorithms is proposed for disk drive scheduling. As opposed to choosing the request with the shortest access time in conventional shortest access time first (SATF) algorithms, we choose an ordered sequence of pending I/O requests at the scheduling instant with the shortest cumulative access time. Additionally, we introduce flexibility for forthcoming requests to alter the chosen sequence. Simulation results are provided to validate the effectiveness of the proposed disk scheduler. Throughput gains of 3% and above are shown to be attainable, although this occurs at the expense of increased computational complexity.


Promoting Peak Shaving While Minimizing Electricity Consumption Payment For Residential Consumers By Using Storage Devices, Simona Oprea, Adela Bara, Mahmut Erkut Cebeci̇, Osman Bülent Tör Jan 2017

Promoting Peak Shaving While Minimizing Electricity Consumption Payment For Residential Consumers By Using Storage Devices, Simona Oprea, Adela Bara, Mahmut Erkut Cebeci̇, Osman Bülent Tör

Turkish Journal of Electrical Engineering and Computer Sciences

Nowadays, smart meters, sensors, and advanced electricity tariff mechanisms such as time-of-use (ToU), critical peak pricing tariff, and real time tariff enable electricity consumption optimization for residential consumers. The main scope of such mechanisms is to promote peak shaving, which leads to minimization of technical losses and avoidance (or delay) of grid onerous investments. This paper proposes a method to determine the optimum capacity of a storage device (SD) that significantly contributes to peak shaving of electricity consumption for residential consumers. Detailed modelling of diverse electric appliances' behavior and consumers' necessities is addressed in order to determine the optimum capacity …


Reactive Power Optimization In A Power System Network Through Metaheuristic Algorithms, Chandragupta Mauryan Kuppamuthu Sivalingam, Subramanian Ramachandran, Purrnimaa Shiva Sakthi Rajamani Jan 2017

Reactive Power Optimization In A Power System Network Through Metaheuristic Algorithms, Chandragupta Mauryan Kuppamuthu Sivalingam, Subramanian Ramachandran, Purrnimaa Shiva Sakthi Rajamani

Turkish Journal of Electrical Engineering and Computer Sciences

Reactive power optimization (RPO) in a power system is a rudimentary necessity for the reduction of the loss of power. For the requirement of a unity power factor in the RPO system, the reduction of the system losses is ensured. The pivotal requirements of a power system are inclusive of a perfect compensation technique and methodology for stable reactive power compensation. The proposed concept in this paper utilizes the different reactive power optimization algorithms and performs a comparison. The process is accomplished by the use of IEEE 6-bus, 14-bus, and 30-bus systems to test the optimization technique. The conclusive information …


A Modified Genetic Algorithm For A Special Case Of The Generalized Assignment Problem, Murat Dörterler, Ömer Faruk Bay, Mehmet Ali̇ Akcayol Jan 2017

A Modified Genetic Algorithm For A Special Case Of The Generalized Assignment Problem, Murat Dörterler, Ömer Faruk Bay, Mehmet Ali̇ Akcayol

Turkish Journal of Electrical Engineering and Computer Sciences

Many central examinations are performed nationwide in Turkey. These examinations are held simultaneously throughout Turkey. Examinees attempt to arrive at the examination centers at the same time and they encounter problems such as traffic congestion, especially in metropolises. The state of mind that this situation puts them into negatively affects the achievement and future goals of the test takers. Our solution to minimize the negative effects of this issue is to assign the test takers to closest examination centers taking into account the capacities of examination halls nearby. This solution is a special case of the generalized assignment problem (GAP). …


Iris Nevus Diagnosis: Convolutional Neural Network And Deep Belief Network, Oyebade Oyedotun, Adnan Khashman Jan 2017

Iris Nevus Diagnosis: Convolutional Neural Network And Deep Belief Network, Oyebade Oyedotun, Adnan Khashman

Turkish Journal of Electrical Engineering and Computer Sciences

This work presents the diagnosis of iris nevus using a convolutional neural network (CNN) and deep belief network (DBN). Iris nevus is a pigmented growth (tumor) found in the front of the eye or around the pupil. It is seen that racial and environmental factors affect the iris color (e.g., blue, hazel, brown) of patients; hence, pigmented growths may be masked in the eye background or iris. In this work, some image processing techniques are applied to images to reinforce areas of interests in them, after which the considered classifiers are trained. We describe the automated diagnosis of iris nevus …


A Comparison Of Feature Extraction Techniques For Malware Analysis, Mohammad Imran, Muhammad Tanvir Afzal, Muhammad Abdul Qadir Jan 2017

A Comparison Of Feature Extraction Techniques For Malware Analysis, Mohammad Imran, Muhammad Tanvir Afzal, Muhammad Abdul Qadir

Turkish Journal of Electrical Engineering and Computer Sciences

The manifold growth of malware in recent years has resulted in extensive research being conducted in the domain of malware analysis and detection, and theories from a wide variety of scientific knowledge domains have been applied to solve this problem. The algorithms from the machine learning paradigm have been particularly explored, and many feature extraction methods have been proposed in the literature for representing malware as feature vectors to be used in machine learning algorithms. In this paper we present a comparison of several feature extraction techniques by first applying them on system call logs of real malware, and then …


Eccentricity Fault Diagnosis In A Permanent Magnet Synchronous Motor Under Nonstationary Speed Conditions, Mustafa Eker, Mehmet Akar Jan 2017

Eccentricity Fault Diagnosis In A Permanent Magnet Synchronous Motor Under Nonstationary Speed Conditions, Mustafa Eker, Mehmet Akar

Turkish Journal of Electrical Engineering and Computer Sciences

Electric motor faults decrease production capacity and increase maintenance costs. Today, predictive detection based on real-time monitoring and fault detection is taking the place of periodic applications. In this study, a new method is presented for the detection of eccentricity faults in permanent magnet synchronous motors. The motor current and the rotor speed were monitored under stationary and nonstationary speed and different load conditions, after which the fault detection was carried out via angular domain-order tracking method. The obtained results were compared with traditional fast Fourier transform results. It was observed that the suggested method can successfully detect the fault …


A Hybrid Of Sliding Mode Control And Fuzzy Logic Control Using A Fuzzy Supervisory Switched System For Dc Motor Speed Control, Husain Ahmed, Abha Rajoriya Jan 2017

A Hybrid Of Sliding Mode Control And Fuzzy Logic Control Using A Fuzzy Supervisory Switched System For Dc Motor Speed Control, Husain Ahmed, Abha Rajoriya

Turkish Journal of Electrical Engineering and Computer Sciences

In many applications of DC motor speed control systems, PID controllers are mostly used. Such control schemes do not show good performance when input and load torque disturbances are applied. This paper shows that sliding mode (SM) can give better control due to its robust property but it has an unwanted chattering problem associated with it, which is harmful to the plant. To limit this problem a hybrid controller is presented in which a fuzzy controller is combined with the SM controller by a fuzzy supervisory system in such a way that the SM controller works in transient state and …


Planar Array Of Right-Angled Isosceles Triangular Microstrip Antenna Using Koch And Meander Lines For The Internet Of Things, Manisha Gupta, Vinita Mathur Jan 2017

Planar Array Of Right-Angled Isosceles Triangular Microstrip Antenna Using Koch And Meander Lines For The Internet Of Things, Manisha Gupta, Vinita Mathur

Turkish Journal of Electrical Engineering and Computer Sciences

An ultrawideband antenna array using a right-angled isosceles triangular microstrip antenna as a basic element is presented using inset feed for applications in the Internet of things. A Koch fractal antenna array with defected ground plane is used to generate multiband applications. Further, meander lines are added to increase the equivalent inductance that reduces the size of the antenna and increases the bandwidth and gain. Antenna arrays have been constructed and experimentally studied. The measured results show good agreement with the numerical prediction and wideband operation.


Dynamic Slot-Based Carrier Scheduling Scheme For Downlink Multimedia Traffic Over Lte Advanced Networks With Carrier Aggregation, Ramachandran Vijayarani, Lakshmanan Nithyanandan Jan 2017

Dynamic Slot-Based Carrier Scheduling Scheme For Downlink Multimedia Traffic Over Lte Advanced Networks With Carrier Aggregation, Ramachandran Vijayarani, Lakshmanan Nithyanandan

Turkish Journal of Electrical Engineering and Computer Sciences

Carrier aggregation (CA) in long-term evolution advanced (LTE-A) networks is a promising tool for providing bandwidth extension for high data rate communication. In CA, the efficient scheduling of carriers has imposed a new challenge in the design of delay-sensitive carrier scheduling for mobile multimedia applications. In this paper, a new dynamic slot-based carrier scheduling scheme has been proposed for efficient resource allocation to support the quality of service (QoS) of mobile traffic over CA transmission. The key idea of this scheduling is the allocation of slots for each component carrier based on the queue state information, taking into consideration the …