Swastika shaped Monopole Antenna with Stubs for Cognitive radio Applications
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2013, Vol 2, Issue 12
Abstract
The proposed antenna designed specifically for Cognitive radio applications consists of a circular monopole which is modified and evolved into the Swastika shaped dotted monopole by incorporating slots into the plane circular monopole which enhances the band width as well as gain. This ultra-wideband sensing antenna covers the spectrum from 3.425 GHz - 14.99 GHz [11.56GHz] with a gain of 6.18dBi as against 10.56GHz bandwidth of plane circular monopole with a gain of 2.171dBi. Simulated results are presented and find in good agreement with the expected results.
Authors and Affiliations
Prof. M. S. Narlawar, Dr. S. L. Badjate
Intelligent Database System-Ontology for a Better Database System
With monumental stress on the huge databases of ever increasing data available not only with the standalone systems but with the networks and internet all loaded with Everest size mountains of huge terabytes of infor...
Image Processing using Bilateral Filtering with future scope in Parellel Processing
Bilateral filtering smooths images while maintaining edges, by use of a nonsimilar combination of nearing image values. The method is less time consuming, local, and easy. It clubs together gray levels or colors based...
Secure Authentication Schemes
There are different authentication methods to provide security. The most commonly used are textual passwords, but are commonly susceptible to brute -force attacks. Recognition and Recall-based techniques on graphical...
Resource Provisioning Techniques in Cloud Computing Environment: A Survey
Cloud Computing is a model for enabling convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, applications and services) that can be rapidly provisioned a...
A Survey Of Intrusion Detection Mechanisms In Multitier Web Applications
Today the usage of computer for web applications is increasing day by day. Most of the transactions such as banking, travel etc are done through web. So the targets of attacks towards web applications are also increa...