<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>VOLUME 6, ISSUE 9, SEPTEMBER 2018 | IJIREEICE</title>
	<atom:link href="https://ijireeice.com/issues/volume-6-issue-9-september-2018/feed/" rel="self" type="application/rss+xml" />
	<link>https://ijireeice.com</link>
	<description>A Peer-reviewed Journal</description>
	<lastBuildDate>Tue, 21 Apr 2026 18:21:48 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	<generator>https://wordpress.org/?v=4.9.26</generator>
	<item>
		<title>Generation and Digital Correlation of Barker Code for Radars and Communication Systems</title>
		<link>https://ijireeice.com/papers/generation-and-digital-correlation-of-barker-code-for-radars-and-communication-systems/</link>
		<pubDate>Thu, 27 Sep 2018 06:13:10 +0000</pubDate>
		<dc:creator><![CDATA[admin]]></dc:creator>
		
		<guid isPermaLink="false">https://ijireeice.com/?post_type=papers&#038;p=4595</guid>
		<description><![CDATA[<p>Abstract: The recent advances in semiconductor technology allow the realization of low cost hardware architecture for implementing the correlation codes, Barker and Taylor codes, with different lengths. There are many types of modulations used for pulse compression, but two that have seen wide applications are the Linear Frequency Modulation (LFM) and the phase-coded pulse. In [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://ijireeice.com/papers/generation-and-digital-correlation-of-barker-code-for-radars-and-communication-systems/">Generation and Digital Correlation of Barker Code for Radars and Communication Systems</a> appeared first on <a rel="nofollow" href="https://ijireeice.com">IJIREEICE</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p style="text-align: justify;"><strong>Abstract:</strong> The recent advances in semiconductor technology allow the realization of low cost hardware architecture for implementing the correlation codes, Barker and Taylor codes, with different lengths. There are many types of modulations used for pulse compression, but two that have seen wide applications are the Linear Frequency Modulation (LFM) and the phase-coded pulse. In this paper, we investigated the second one by the design of  Barker code generator circuit using two different configurations. This is very important for modern radar transmitters and communication systems. Such codes enable the design of pulse compression circuit in sophisticated receivers to make use of their benefits in improving the resolution in angles and range as well as enhancement of signal to noise ratio(S / N) . In addition, we addressed the design of 7-bit digital correlator to focus on its correlation property. It is interesting to go beyond the theoretical study and analysis by applying the package of simulation to shed the light on all the details in time domain. Specifically, the binary phase variations (0, ) between the modulating signal ,correlation codes, and the carrier signal. Taylor code ,double Barker code of length: 26, has good autocorrelation properties and we have found it with low cross- correlation. Therefore it is suitable in multi-user environment and to encode the carrier signal of long duration for transmitted pulses. Its combination with Barker code of length:13 leads to form different operating modes which is applied to fire control and early warning radars. Also it keeps constant side lobe level with low value which alleviates the effect of undesired received signals.</p>
<p style="text-align: justify;"><strong>Keywords: </strong>Barker Code Generator; Taylor Code; Auto Correlation Function; Digital Correlator; Phase coding; Pulse Compression</p>
<p>The post <a rel="nofollow" href="https://ijireeice.com/papers/generation-and-digital-correlation-of-barker-code-for-radars-and-communication-systems/">Generation and Digital Correlation of Barker Code for Radars and Communication Systems</a> appeared first on <a rel="nofollow" href="https://ijireeice.com">IJIREEICE</a>.</p>
]]></content:encoded>
			</item>
		<item>
		<title>Low Cost Portable Emission Tester using Bluetooth and Android Application</title>
		<link>https://ijireeice.com/papers/low-cost-portable-emission-tester-using-bluetooth-and-andriod-application/</link>
		<pubDate>Tue, 02 Oct 2018 07:33:40 +0000</pubDate>
		<dc:creator><![CDATA[admin]]></dc:creator>
		
		<guid isPermaLink="false">https://ijireeice.com/?post_type=papers&#038;p=4703</guid>
		<description><![CDATA[<p>Abstract: Emissions of many air pollutants have been shown to have a variety of negative effects on public health and the natural environment. With the ever increasing population and the need for automobiles for transportation, the number of vehicles have increased considerably which has lead to increase in the emission of air pollutants such a [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://ijireeice.com/papers/low-cost-portable-emission-tester-using-bluetooth-and-andriod-application/">Low Cost Portable Emission Tester using Bluetooth and Android Application</a> appeared first on <a rel="nofollow" href="https://ijireeice.com">IJIREEICE</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p style="text-align: justify;"><strong>Abstract</strong>: Emissions of many air pollutants have been shown to have a variety of negative effects on public health and the natural environment. With the ever increasing population and the need for automobiles for transportation, the number of vehicles have increased considerably which has lead to increase in the emission of air pollutants such a CO, CO2, Hydrocarbons, SO2, etc., which may cause grievous problems to living beings and environment. One solution to this problem is frequent monitoring of the gases in the environment. In India, the present emission monitoring system is available only at emission testing centers located either in petrol bunks or few other places. The model we have designed can be handed over to the traffic police for continuous and instant monitoring of emission levels of vehicles. The present standard device is not portable and involves wired connections unlike our design which is portable, rechargeable and wireless. These features make our design easier to use than the traditional device. Also, our new model is comparatively cheaper than the existing device with the same level of accuracy.  Unlike the present emission testing device our model uses an android application to monitor emission levels and does not require any paper work. Moreover, we express our distress in the present emission monitoring system which involves multiple malpractices by manipulating the recorded emission levels for bribe. This can be eliminated by our device which includes instant and real-time monitoring of emission levels of vehicles already certified.</p>
<p style="text-align: justify;"><strong>Keywords:</strong> Emission Tester, Bluetooth, android app, COPD</p>
<p>The post <a rel="nofollow" href="https://ijireeice.com/papers/low-cost-portable-emission-tester-using-bluetooth-and-andriod-application/">Low Cost Portable Emission Tester using Bluetooth and Android Application</a> appeared first on <a rel="nofollow" href="https://ijireeice.com">IJIREEICE</a>.</p>
]]></content:encoded>
			</item>
		<item>
		<title>Visibility Enhancement in Surveillance and Reconnaissance Mission for Unmanned Aerial Systems</title>
		<link>https://ijireeice.com/papers/visibility-enhancement-in-surveillance-and-reconnaissance-mission-for-unmanned-aerial-systems/</link>
		<pubDate>Thu, 04 Oct 2018 06:09:10 +0000</pubDate>
		<dc:creator><![CDATA[admin]]></dc:creator>
		
		<guid isPermaLink="false">https://ijireeice.com/?post_type=papers&#038;p=4781</guid>
		<description><![CDATA[<p>Abstract: Unmanned Aerial System (UAS) have become very popular these days as they are replacing human effort to carry out operations in certain areas where human beings cannot have access. They have made their way through the military as well as civilian sectors. They are also of low cost and easy to operate. During Low [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://ijireeice.com/papers/visibility-enhancement-in-surveillance-and-reconnaissance-mission-for-unmanned-aerial-systems/">Visibility Enhancement in Surveillance and Reconnaissance Mission for Unmanned Aerial Systems</a> appeared first on <a rel="nofollow" href="https://ijireeice.com">IJIREEICE</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p style="text-align: justify;"><strong>Abstract:</strong> Unmanned Aerial System (UAS) have become very popular these days as they are replacing human effort to carry out operations in certain areas where human beings cannot have access. They have made their way through the military as well as civilian sectors. They are also of low cost and easy to operate. During Low visibility conditions, when the UAV is flying out side of Line Of Sight (LOS), we will make use of First Person View (FPV). During such exercise images may affect with haze, blur &amp; noise. Dark Channel Prior method is used to remove haze from a single input image; Blurred images are handled by deploying a Wiener filter.</p>
<p style="text-align: justify;"> <strong>Keywords:</strong> UAS, LOS, FPV, Low visibility, Haze, Blur, Dark Channel Prior, Wiener filter.</p>
<p>The post <a rel="nofollow" href="https://ijireeice.com/papers/visibility-enhancement-in-surveillance-and-reconnaissance-mission-for-unmanned-aerial-systems/">Visibility Enhancement in Surveillance and Reconnaissance Mission for Unmanned Aerial Systems</a> appeared first on <a rel="nofollow" href="https://ijireeice.com">IJIREEICE</a>.</p>
]]></content:encoded>
			</item>
		<item>
		<title>Detecting Trojans and Enhancing Security of Safety Critical IP Cores</title>
		<link>https://ijireeice.com/papers/detecting-trojans-and-enhancing-security-of-safety-critical-ip-cores/</link>
		<pubDate>Thu, 04 Oct 2018 06:10:19 +0000</pubDate>
		<dc:creator><![CDATA[admin]]></dc:creator>
		
		<guid isPermaLink="false">https://ijireeice.com/?post_type=papers&#038;p=4784</guid>
		<description><![CDATA[<p>Abstract: The Intellectual Property (IP) blocks are designed by hundreds of IP vendors distributed across the world. Such IPs cannot be assumed trusted as Trojans can be maliciously inserted into them and could be used in military, financial and other critical applications. It is extremely difficult to detect Trojans in third-party IPs simply with conventional [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://ijireeice.com/papers/detecting-trojans-and-enhancing-security-of-safety-critical-ip-cores/">Detecting Trojans and Enhancing Security of Safety Critical IP Cores</a> appeared first on <a rel="nofollow" href="https://ijireeice.com">IJIREEICE</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p style="text-align: justify;"><strong>Abstract: </strong>The Intellectual Property (IP) blocks are designed by hundreds of IP vendors distributed across the world. Such IPs cannot be assumed trusted as Trojans can be maliciously inserted into them and could be used in military, financial and other critical applications. It is extremely difficult to detect Trojans in third-party IPs simply with conventional verification methods as well as methods developed for detecting Trojans in fabricated ICs. The transfer of provably trustworthy modules between hardware IP producers and consumers, and discuss what it might mean for a device to be considered “secure”. We outline a semantic model representing the constructs permissible in a Verilog Hardware Description Language (HDL) and show how this model can be used to reason about the trustworthiness of circuits represented at the Register-Transfer Level (RTL). Identifying Suspicious Signals (SS) with formal verification, coverage analysis and Structural tests is area of focus.</p>
<p style="text-align: justify;"><strong>Keywords:</strong> HDL, RTL, IP, Trojans, secure, formal verification, coverage analysis, Structural tests.</p>
<p>The post <a rel="nofollow" href="https://ijireeice.com/papers/detecting-trojans-and-enhancing-security-of-safety-critical-ip-cores/">Detecting Trojans and Enhancing Security of Safety Critical IP Cores</a> appeared first on <a rel="nofollow" href="https://ijireeice.com">IJIREEICE</a>.</p>
]]></content:encoded>
			</item>
		<item>
		<title>Dynamic Cluster Head Selection Mechanism with Wireless Sensor Networks for Irrigation Application</title>
		<link>https://ijireeice.com/papers/dynamic-cluster-head-selection-mechanism-with-wireless-sensor-networks-for-irrigation-application/</link>
		<pubDate>Fri, 05 Oct 2018 11:53:29 +0000</pubDate>
		<dc:creator><![CDATA[admin]]></dc:creator>
		
		<guid isPermaLink="false">https://ijireeice.com/?post_type=papers&#038;p=4788</guid>
		<description><![CDATA[<p>Abstract: A wireless sensor network is a wireless network consisting of spatially distributed autonomous devices using sensors to monitor physical or environmental conditions.  The components are selected, which is depends on agriculture application. The WSN node is used for sensing, processing and communicating. These nodes are cluster head and slave. The need of protocol is to [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://ijireeice.com/papers/dynamic-cluster-head-selection-mechanism-with-wireless-sensor-networks-for-irrigation-application/">Dynamic Cluster Head Selection Mechanism with Wireless Sensor Networks for Irrigation Application</a> appeared first on <a rel="nofollow" href="https://ijireeice.com">IJIREEICE</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p style="text-align: justify;"><strong>Abstract:</strong> A wireless sensor network is a wireless network consisting of spatially distributed autonomous devices using sensors to monitor physical or environmental conditions.  The components are selected, which is depends on agriculture application. The WSN node is used for sensing, processing and communicating. These nodes are cluster head and slave. The need of protocol is to define rules for each step and process during communication. The protocol is set of rules. The main job of protocol in our project work is to maintain the lifespan of WSN nodes. In this proposed work, arduino based WSN node system are designed and developed for experimentation. The sensor such as moisture, temperature, humidity and light are used for agriculture application. The data collected from these sensors are stored in memory and transferred to PC using RF modules. A technique based on modified LEACH protocol is used to maintain store energy in WSN nodes. This in turn, enhances the lifespan of cluster head WSN node. The sensor nodes are powered by rechargeable batteries. This system will help farmers to monitor their crop with performance parameter measured and displayed. It will enhance productivity of crops.</p>
<p style="text-align: justify;"><strong>Keywords:</strong> Wireless Sensor Network; Modified LEACH Protocol; Cluster Head</p>
<p>The post <a rel="nofollow" href="https://ijireeice.com/papers/dynamic-cluster-head-selection-mechanism-with-wireless-sensor-networks-for-irrigation-application/">Dynamic Cluster Head Selection Mechanism with Wireless Sensor Networks for Irrigation Application</a> appeared first on <a rel="nofollow" href="https://ijireeice.com">IJIREEICE</a>.</p>
]]></content:encoded>
			</item>
		<item>
		<title>Design and Development of Automatic Whiteboard Cleaner for Effective Cleaning Mechanism using Arduino</title>
		<link>https://ijireeice.com/papers/design-and-development-of-automatic-whiteboard-cleaner-for-effective-cleaning-mechanism-using-arduino/</link>
		<pubDate>Fri, 05 Oct 2018 11:54:49 +0000</pubDate>
		<dc:creator><![CDATA[admin]]></dc:creator>
		
		<guid isPermaLink="false">https://ijireeice.com/?post_type=papers&#038;p=4791</guid>
		<description><![CDATA[<p>Abstract: At recent years whiteboard has become a crucial element at almost every educational institute. They are large in size, for that reason it is very time consuming and tedious process to erase the writings from the board with duster manually. It breaks concentration of both lecturers and listeners. Automatic Whiteboard Cleaner can solve these [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://ijireeice.com/papers/design-and-development-of-automatic-whiteboard-cleaner-for-effective-cleaning-mechanism-using-arduino/">Design and Development of Automatic Whiteboard Cleaner for Effective Cleaning Mechanism using Arduino</a> appeared first on <a rel="nofollow" href="https://ijireeice.com">IJIREEICE</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p style="text-align: justify;"><strong>Abstract:</strong> At recent years whiteboard has become a crucial element at almost every educational institute. They are large in size, for that reason it is very time consuming and tedious process to erase the writings from the board with duster manually. It breaks concentration of both lecturers and listeners. Automatic Whiteboard Cleaner can solve these problems. Automatic whiteboard cleaner will reduce the time and also the effort. This paper represents the design and construction of automatic whiteboard cleaner. The system consists of Arduino, relay, dc gear motor, supports and a cleaner bar to give that an automation figure. When the switch is on, it moves across the full width of the board and its direction is reversed automatically in order to clean the board. So, this “Automatic Whiteboard Cleaner” is a great replacement of  “duster” and it can be suggested to use this to reduce the effort of the board user as well as to introduce the classroom with an automation system.</p>
<p style="text-align: justify;"><strong>Keywords:</strong> Automation, whiteboard cleaner, Arduino, rack and pinion mechanism</p>
<p>The post <a rel="nofollow" href="https://ijireeice.com/papers/design-and-development-of-automatic-whiteboard-cleaner-for-effective-cleaning-mechanism-using-arduino/">Design and Development of Automatic Whiteboard Cleaner for Effective Cleaning Mechanism using Arduino</a> appeared first on <a rel="nofollow" href="https://ijireeice.com">IJIREEICE</a>.</p>
]]></content:encoded>
			</item>
		<item>
		<title>Home Security using Vibration Sensor</title>
		<link>https://ijireeice.com/papers/home-security-using-vibration-sensor/</link>
		<pubDate>Wed, 10 Oct 2018 12:21:44 +0000</pubDate>
		<dc:creator><![CDATA[admin]]></dc:creator>
		
		<guid isPermaLink="false">https://ijireeice.com/?post_type=papers&#038;p=4827</guid>
		<description><![CDATA[<p>Abstract: Security is very essential now days as most people are at work and their homes remain closed for most of the time. So a need of a security system even when we are away from it is essential. In our project we are trying to provide a security system through which the owner and [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://ijireeice.com/papers/home-security-using-vibration-sensor/">Home Security using Vibration Sensor</a> appeared first on <a rel="nofollow" href="https://ijireeice.com">IJIREEICE</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p><strong>Abstract:</strong> Security is very essential now days as most people are at work and their homes remain closed for most of the time. So a need of a security system even when we are away from it is essential. In our project we are trying to provide a security system through which the owner and the members can keep an eye on their home while being away from it. This system uses a vibration sensor for monitoring vibrations. Vibrations occur when a thief or unwanted entry tries to break in the door/window and tries to enter. The controller (Node MCU) senses the vibrations and sends the values to Raspberry Pi. The Raspberry pi checks the values and compares with the desired set of values. If the input value is greater than the threshold value then it turns ON a buzzer and the Raspberry Pi controller sends a message to the desired owners of the system and the security department and it starts the video capturing of the scene. The owner can then live stream the video by simply typing the IP address of the Pi controller in the web browser. In this way the owner can take desired actions in the future.</p>
<p><strong>Keywords:</strong> Vibration Sensor, Raspberry Pi, Node MCU, Live Stream the Video</p>
<p>The post <a rel="nofollow" href="https://ijireeice.com/papers/home-security-using-vibration-sensor/">Home Security using Vibration Sensor</a> appeared first on <a rel="nofollow" href="https://ijireeice.com">IJIREEICE</a>.</p>
]]></content:encoded>
			</item>
		<item>
		<title>Improving Power Quality of Induction Motors using Capacitor Bank</title>
		<link>https://ijireeice.com/papers/improving-power-quality-of-induction-motors-using-capacitor-bank/</link>
		<pubDate>Mon, 15 Oct 2018 07:45:40 +0000</pubDate>
		<dc:creator><![CDATA[admin]]></dc:creator>
		
		<guid isPermaLink="false">https://ijireeice.com/?post_type=papers&#038;p=4834</guid>
		<description><![CDATA[<p>Abstract: In this paper, the improvement in power factor of induction motor by using capacitor bank is represented with the help of MATLAB simulation model. When power factor is improved, automatically energy will be saved A power factor is the goal of any electrical utility company since if the power factor is less than one, [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://ijireeice.com/papers/improving-power-quality-of-induction-motors-using-capacitor-bank/">Improving Power Quality of Induction Motors using Capacitor Bank</a> appeared first on <a rel="nofollow" href="https://ijireeice.com">IJIREEICE</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p><strong>Abstract:</strong> In this paper, the improvement in power factor of induction motor by using capacitor bank is represented with the help of MATLAB simulation model. When power factor is improved, automatically energy will be saved A power factor is the goal of any electrical utility company since if the power factor is less than one, they have to supply more current to the user for a given amount of power use. In so doing they occur more line losses. Induction motors are the most widely used electrical motors due to their reliability, low cost and robustness. For industrial and mining applications, 3- phase AC induction motors are the prime movers for the vast majority of machines. It has been estimated that 70% to 80% of all electricity in the world is consumed by these motors. At no load induction motor has very low power factor. It improves at increasing load from no load to full Load. Power factor correction is achieved by the addition of capacitors in parallel with the connected motor circuits and can be applied at the starter, or applied at the switchboard or distribution panel.</p>
<p><strong>Keywords:</strong> Power Factor Improvement, Capacitor Bank, Induction Motor</p>
<p>The post <a rel="nofollow" href="https://ijireeice.com/papers/improving-power-quality-of-induction-motors-using-capacitor-bank/">Improving Power Quality of Induction Motors using Capacitor Bank</a> appeared first on <a rel="nofollow" href="https://ijireeice.com">IJIREEICE</a>.</p>
]]></content:encoded>
			</item>
		<item>
		<title>Sensible Keyword Search for Reliable Access Management in Secure Cloud Storage</title>
		<link>https://ijireeice.com/papers/sensible-keyword-search-for-reliable-access-management-in-secure-cloud-storage/</link>
		<pubDate>Fri, 13 Sep 2024 10:45:09 +0000</pubDate>
		<dc:creator><![CDATA[admin]]></dc:creator>
		
		<guid isPermaLink="false">https://ijireeice.com/?post_type=papers&#038;p=10024</guid>
		<description><![CDATA[<p>Abstract: In the contemporary landscape characterized by extensive data utilization, cloud computing has emerged as a novel computing paradigm that facilitates the sharing of computing resources via the internet. The defining features of cloud computing include on-demand self-service, location-independent network access, ubiquitous network connectivity, and a pay-per-use model. These appealing attributes have led both private [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://ijireeice.com/papers/sensible-keyword-search-for-reliable-access-management-in-secure-cloud-storage/">Sensible Keyword Search for Reliable Access Management in Secure Cloud Storage</a> appeared first on <a rel="nofollow" href="https://ijireeice.com">IJIREEICE</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p>Abstract: In the contemporary landscape characterized by extensive data utilization, cloud computing has emerged as a novel computing paradigm that facilitates the sharing of computing resources via the internet. The defining features of cloud computing include on-demand self-service, location-independent network access, ubiquitous network connectivity, and a pay-per-use model. These appealing attributes have led both private and public organizations to outsource substantial volumes of data to cloud storage solutions. Consequently, organizations are increasingly motivated to transition their data from local environments to centralized commercial public cloud servers. By outsourcing their data to the cloud, users can alleviate the burdens associated with storage maintenance. However, despite the numerous advantages of migrating data to cloud storage, significant security concerns arise, causing data owners to hesitate when it comes to transferring sensitive information. This situation results in a shift of data control towards cloud service providers. To address these security challenges, data owners are compelled to encrypt their data prior to outsourcing. While encryption enhances data security, it simultaneously diminishes data efficiency, as searching through encrypted data proves to be complex. Traditional search techniques applicable to plaintext data cannot be utilized for encrypted data. Current solutions primarily support exact keyword searches, lacking support for semantic searches. In this project, we propose a semantic multi-keyword ranked search system that incorporates verifiable outsourced decryption. To enhance search efficiency, this system integrates semantic search capabilities through the implementation of fuzzy search techniques.</p>
<p>Keywords: Encryption, sensitive, multi-keyword, service providers.</p>
<p>The post <a rel="nofollow" href="https://ijireeice.com/papers/sensible-keyword-search-for-reliable-access-management-in-secure-cloud-storage/">Sensible Keyword Search for Reliable Access Management in Secure Cloud Storage</a> appeared first on <a rel="nofollow" href="https://ijireeice.com">IJIREEICE</a>.</p>
]]></content:encoded>
			</item>
	</channel>
</rss>
