IJCRT Peer-Reviewed (Refereed) Journal as Per New UGC Rules.
ISSN Approved Journal No: 2320-2882 | Impact factor: 7.97 | ESTD Year: 2013
Scholarly open access journals, Peer-reviewed, and Refereed Journals, Impact factor 7.97 (Calculate by google scholar and Semantic Scholar | AI-Powered Research Tool) , Multidisciplinary, Monthly, Indexing in all major database & Metadata, Citation Generator, Digital Object Identifier(CrossRef DOI)
| IJCRT Journal front page | IJCRT Journal Back Page |
Paper Title: TRUST EVALUATION ALGORITHM (TEA) TO IDENTIFY MALICIOUS NODE IN MANET
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRTNTSE020
Register Paper ID - 181733
Title: TRUST EVALUATION ALGORITHM (TEA) TO IDENTIFY MALICIOUS NODE IN MANET
Author Name(s): L Raghavendar Raju
Publisher Journal name: IJCRT
Volume: 6
Issue: 1
Pages: 95-98
Year: February 2018
Downloads: 2485
MANET is less resistant to malicious node more prone to selfish behavior of nodes and compromised nodes which are most often undetectable. Due to resource constraints and high mobility characteristics. In a clustered network one of the cluster member is chosen as a cluster head. But if the selected node becomes selfish or malicious, it will affect the performance of the entire group communication. This paper proposes a Trust Evaluation Algorithm (TEA) to identify the nodes with highest level of trust within the cluster. The nodes are added to the trust table based on the calculated trust level. The friends having highest trust level is eligible to become cluster heads. Among the available cluster heads, one among them is selected as the cluster head.other nodes are considered as a cluster members. The nodes with least trust values are regarded as malicious and are removed from the list and are stored in a noticeable unwanted record. Our TEA approach succeeds in achieving high resistance towards network attacks.
Licence: creative commons attribution 4.0
MANETs, QoS Trust, TRUST, Cluster Head
Paper Title: PARTICLE SWARM OPTIMIZATION METHODOLOGY FOR CLASSIFICATION OF IMAGES
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRTNTSE019
Register Paper ID - 181732
Title: PARTICLE SWARM OPTIMIZATION METHODOLOGY FOR CLASSIFICATION OF IMAGES
Author Name(s): G. Shyama Chandra Prasad
Publisher Journal name: IJCRT
Volume: 6
Issue: 1
Pages: 89-94
Year: February 2018
Downloads: 2360
In this paper how Particle Swarm Optimization Radial Basis Function Neural Network is used for solving pattern recognition issues is discussed. To improve the pattern recognition efficiency PSO technique is used to find the weights and bias values and k-means algorithm is used to find the centroid values of the radial basis function neural network. Finally proved that this method shows better accuracy than the traditional RBF model.
Licence: creative commons attribution 4.0
Particle Swarm Optimization, Neural Network, Pattern Recognition, Radial Basis Function Network
Paper Title: NATIVITY LANGUAGE PREDICTION USING A DOCUMENT WEIGHTED APPROACH
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRTNTSE018
Register Paper ID - 181730
Title: NATIVITY LANGUAGE PREDICTION USING A DOCUMENT WEIGHTED APPROACH
Author Name(s): Raghunadha Reddy. T
Publisher Journal name: IJCRT
Volume: 6
Issue: 1
Pages: 85-88
Year: February 2018
Downloads: 2354
The task of analyzing an interested text to find demographic characteristics such as gender, age, country and nativity language of an unknown author based on the writing style of the text called Author Profiling. The writing style differences are very important in Author Profiling research. Different researchers proposed several stylistic features to differentiate the writing style of the authors. In this work, the experimentation carried out with content based features like most frequent terms in the corpus to predict the nativity language of the authors. A Profile specific Document Weighted approach is used with most frequent terms as features. In this approach, the document weights are used to represent the document vectors. Various classification algorithms were used to generate the classification model and to predict the nativity language of the authors. The achieved results were good when compared with exiting techniques for nativity language prediction in Author Profiling research area.
Licence: creative commons attribution 4.0
Author Profiling, Profile specific Document Weighted approach, Nativity Language Prediction, Term Weight Measure, Document Weight Measure
Paper Title: HOME AUTOMATION USING MQTT SERVER
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRTNTSE017
Register Paper ID - 181727
Title: HOME AUTOMATION USING MQTT SERVER
Author Name(s): Bhagya Laxmi. K
Publisher Journal name: IJCRT
Volume: 6
Issue: 1
Pages: 82-84
Year: February 2018
Downloads: 2625
Licence: creative commons attribution 4.0
Wi-Fi, Local Area Network, Message Queening Telemetry Transport
Paper Title: FPGA BASED SIMULATION OF A FEED FORWARD NEURAL NETWORK USING VHDL
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRTNTSE016
Register Paper ID - 181684
Title: FPGA BASED SIMULATION OF A FEED FORWARD NEURAL NETWORK USING VHDL
Author Name(s): B.M.S.S.S. Aditya
Publisher Journal name: IJCRT
Volume: 6
Issue: 1
Pages: 76-81
Year: February 2018
Downloads: 2366
In this paper a hardware implementation of a neural network using Field Programmable Gate Arrays (FPGA) is presented. Digital system architecture is designed to realize a feed forward neural network. The feed forward network has 7 nodes and 3 layers, and this network achieving node parallelism and layer parallelism the designed architecture is described using Very High Speed Integrated Circuits Hardware Description Language (VHDL). After a brief review the implementation our simulation results have been presented.
Licence: creative commons attribution 4.0
Neural network, FPGA, VHDL, feed forward network
Paper Title: RELATED KEY–RECTANGLE AND BOOMERANG COMBINED ATTACK ON MDA
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRTNTSE015
Register Paper ID - 181683
Title: RELATED KEY–RECTANGLE AND BOOMERANG COMBINED ATTACK ON MDA
Author Name(s): B. Srinivasa Rao
Publisher Journal name: IJCRT
Volume: 6
Issue: 1
Pages: 70-75
Year: February 2018
Downloads: 2360
RELATED KEY–RECTANGLE AND BOOMERANG COMBINED ATTACK ON MDA
Licence: creative commons attribution 4.0
Combined attacks, Cryptanalysis, Message Digest Algorithms, Related Key Cryptanalysis.
Paper Title: SENTIMENT ANALYSIS ON PRODUCT REVIEWS USING BIG DATA
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRTNTSE014
Register Paper ID - 181682
Title: SENTIMENT ANALYSIS ON PRODUCT REVIEWS USING BIG DATA
Author Name(s): Mrs. J. Samatha
Publisher Journal name: IJCRT
Volume: 6
Issue: 1
Pages: 66-69
Year: February 2018
Downloads: 2607
Most of the e-commerce sites raise their customers to supply relevant reviews on their merchandise that might facilitate alternative customers to choose their alternative. A slew of reviews is being generated on a each day attributable to a rise within the usage of ecommerce sites. a possible client may have to travel through thousands of reviews before inward at a firm call, that is long. Many users give reviews for the single product. Such thousands of review can be analyzed using big data effectively. The results can be presented in a convenient visual form for the non-technical user. Thus, the primary goal of research work is the classification of customer reviews given for the product in the map-reduce framework
Licence: creative commons attribution 4.0
Sentiment Analysis, Opinion Mining, Product Reviews, Hadoop, MapReduce, Sentiwordnet.
Paper Title: ANALYZING VARIOUS FACE RECOGNITION TECHNIQUES USING NEURAL NETWORKS
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRTNTSE013
Register Paper ID - 181624
Title: ANALYZING VARIOUS FACE RECOGNITION TECHNIQUES USING NEURAL NETWORKS
Author Name(s): Dr. K. Sunil Manohar Reddy
Publisher Journal name: IJCRT
Volume: 6
Issue: 1
Pages: 63-65
Year: February 2018
Downloads: 2408
Face recognition is a form of biometric identification and off late it has become the most important method to recognize various people in a real time system. Recognition is a method to identify a person in a still image or in video. It became important due to its applications in many safety and security related areas such as at airports, banks for authentication. New research studies of recognition in this area in recent years is focused towards using neural network methods. Going forward in research in this area is application of Fuzzy system. In this comparative study the focus will be on neural networks, fuzzy system and neuro-Fuzzy system.
Licence: creative commons attribution 4.0
- Neural networks, face recognition, fuzzy system, Neuro-fuzzy.
Paper Title: PERFORMANCE ENHANCEMENT OF RMPA BY UNDERNEATH 2D-EBG GROUND PLANE
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRTNTSE012
Register Paper ID - 181657
Title: PERFORMANCE ENHANCEMENT OF RMPA BY UNDERNEATH 2D-EBG GROUND PLANE
Author Name(s): Kunapareddy Koteswara Rao
Publisher Journal name: IJCRT
Volume: 6
Issue: 1
Pages: 57-62
Year: February 2018
Downloads: 2361
The radiation characteristics of Rectangular Microstrip Patch Antenna (RMPA) placed over two dimensional Electromagnetic Band Gap (2D-EBG) ground plane is studied. The complete model is designed in numerical 3D-EM (electromagnetic) simulation software. The results obtained are compared with results of conventional RMPA over conducting ground. The dimensions of 2DEBG are considered such that it can operate within ISM band, and RMPA is made to operate within the ISM band gap. The first part of this paper contains characterization of surface properties of 2DEBG. The 2DEBG is resonating at 2.5GHz with a FBG (forbidden band gap) of 1.5GHz, in phase reflection band gap (AMC) of 41MHz and a high impedance of 3540 ohms. The high surface impedance property of helps achieve RMPA miniaturization. The property of in-phase reflection band helps to enhance the gain upto 3.5dB, when compared with the conventional arrangement. Due to surface wave band gap property, smoother radiation pattern, improvement in the radiation efficiency and an operating band width of 3% has been achieved.
Licence: creative commons attribution 4.0
EBG (Electromagnetic band gap), EM(Electromagnetic) Waves, AMC (Artificial Magnetic Conductor)
Paper Title: ADAPTIVE METHODS FOR EARLY IDENTIFICATION OF GLAUCOMA FOR DIABETIC RETINOPATHY USING MATLAB GUI
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRTNTSE011
Register Paper ID - 181656
Title: ADAPTIVE METHODS FOR EARLY IDENTIFICATION OF GLAUCOMA FOR DIABETIC RETINOPATHY USING MATLAB GUI
Author Name(s): B.Anupama
Publisher Journal name: IJCRT
Volume: 6
Issue: 1
Pages: 50-56
Year: February 2018
Downloads: 2307
Licence: creative commons attribution 4.0
Glaucoma, Funds Image, CDR, Diabetic Retinopathy, Image processing, image subtraction.
Paper Title: EFFECTIVE FOOD GRAIN LOSS REDUCTION TECHNIQUE USING IOT
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRTNTSE010
Register Paper ID - 181653
Title: EFFECTIVE FOOD GRAIN LOSS REDUCTION TECHNIQUE USING IOT
Author Name(s): A S Keerthi Nayani
Publisher Journal name: IJCRT
Volume: 6
Issue: 1
Pages: 45-49
Year: February 2018
Downloads: 2451
Internet of Things(IoT) is one of the affirmative platforms to implement a large data analytics task which comprises the way to exploits networking, detecting, huge information, and computerized reasoning innovation to convey finish frameworks for an item or administration. These frameworks permit more prominent straightforwardness, control, and execution when connected to any industry or fr.In this paper, we are going to discuss about loss due to atmospheric moisture beyond threshold results in infestation etc and hence damages the food grain. Those losses can be reduced effectively with support of various sensors to detecting the status of food grains stored in the Central Warehousing. Based on moisture and temperature data captured, the software should do appropriate data analytics and send timely alert to concern officials of CWC for mitigation and remedial actions arising due to moisture and temperature inside the warehouse. This paper emphasizes the usage of IoT which enables the Central warehouse centers to avoid the losses of food grains.
Licence: creative commons attribution 4.0
Moister, Temperature, Sensors, IoT Technology.
Paper Title: POTHOLE DETECTION SYSTEM: ‘MONITORING ROAD SURFACE ABERRATIONS USING A WIRELESS SENSOR NETWORK’
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRTNTSE009
Register Paper ID - 181651
Title: POTHOLE DETECTION SYSTEM: ‘MONITORING ROAD SURFACE ABERRATIONS USING A WIRELESS SENSOR NETWORK’
Author Name(s): D.Nagaraju
Publisher Journal name: IJCRT
Volume: 6
Issue: 1
Pages: 41-44
Year: February 2018
Downloads: 2360
Potholes are a major obstacle for road transport which greatly affect the commute time and comfort. Detecting and locating the potholes ensures a better commute and helps in preventing any possible fatalities. The system would be installed on a vehicle and would perform the function of road surface monitoring, using the inherent mobility of the vehicle. The system would consist of a sensing unit, micro-controller unit and a GPS subsystem. The sensing unit consists of accelerometers, deployed at specific positions which would help them make use of the accelerations generated during the motion of the vehicle. The data generated from the accelerometers would indicate the presence of potholes or severe road surface anomalies. The micro-controller unit then collects the data, which is then processed utilizing the Machine Learning algorithms. This onerous task of data processing, leads to the distinguished possibilities of pothole detection or vibrations generated due to a severe lateral unevenness on the surface of the road. At the time of the detection, the GPS unit logs the co-ordinates of that location, which then can be represented on a map and shared through a mobile application, enabling the users to choose alternative ways depending on the conditions of the road in their respective routes of travel.
Licence: creative commons attribution 4.0
Wireless Sensor Networks, GPS, Cloud Computing, Pothole Patrol.
Paper Title: RTL GENERATION USING A HIGH PERFORMANCE DIF ALGORITHM USING ‘C’
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRTNTSE008
Register Paper ID - 181649
Title: RTL GENERATION USING A HIGH PERFORMANCE DIF ALGORITHM USING ‘C’
Author Name(s): Mr.Upendar Sapati
Publisher Journal name: IJCRT
Volume: 6
Issue: 1
Pages: 36-40
Year: February 2018
Downloads: 2323
Powerful high-level languages to RTL generators are now emerging. One of the use of these tools is to allow software engineers to implement algorithms quickly in a familiar language and target the design to a programmable device. The generators available today support syntaxes with varying degrees of fidelity to the original language. This paper focuses on the efficient use of C to RTL generators that have a high degree of fidelity to the original C language. However, coding algorithms without regard for the capabilities of the target programmable logic can lead to low-performance realizations of the algorithm that are several times slower than what could be achieved with a DSP. This paper presents the architecture of a high-performance radix-2 FFT written in ANSI C that is similar in composition to the classic C implementation that is familiar to most engineers. First, methods to organize memory elements and arrays for maximum data accesses per clock cycle are discussed. Next, the exploitation of the natural parallelism of a radix-2 decimation in frequency algorithm is discussed. Finally, the performance improvement by hiding the first and last of the log2(n) butterfly stages is discussed. The resulting RTL outperforms hand optimized DSP assembly code by a factor of three while using less effective area than a DSP solution.
Licence: creative commons attribution 4.0
C Language, Code Converters, Discrete Fourier Transforms, Field programmable gate arrays, Hardware Design Languages, Logic Design
Paper Title: A REVIEW ON MIXED IRIS SPOOFING ATTACKS DETECTION
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRTNTSE007
Register Paper ID - 181645
Title: A REVIEW ON MIXED IRIS SPOOFING ATTACKS DETECTION
Author Name(s): Dr.PallaviKhare
Publisher Journal name: IJCRT
Volume: 6
Issue: 1
Pages: 33-35
Year: February 2018
Downloads: 2261
Human iris is viewed as a dependable and exact methodology for biometric acknowledgment because of its one of a kind surface data. All known biometric frameworks are helpless against introduction assaults (usually called ridiculing) that endeavor to cover or imitate character. Image based biometric modalities (e.g. confront, finger, iris) are especially helpless at the image obtaining step. Cases of run of the mill iris parodying assaults are printed iris images, finished contact focal points, and engineered formation of iris images. It is basic to take note of that greater part of the calculations proposed in the writing are prepared to deal with a particular kind of parodying assault. These calculations as a rule perform exceptionally well on that specific assault. Notwithstanding, in genuine applications, an assailant may perform distinctive parodying assaults. In such a case, the issue turns out to be all the more difficult because of natural varieties in various assaults. In this paper, we concentrate on a mixture of iris mocking assaults and present a bound together structure for distinguishing such assaults. We propose a novel basic and textural include based iris mocking recognition structure (DESIST). Multi-arrange thick Zernike minutes are ascertained over the iris image which encode varieties in structure of the iris image. Neighborhood Binary Pattern with Variance (LBPV) is used for speaking to textural changes in a caricature iris image. The most noteworthy characterization precision is seen by the proposed structure for recognizing ordinary and parodied iris images on a joined iris caricaturing database.
Licence: creative commons attribution 4.0
Iris recognition, Iris, Databases, Lenses, Feature extraction, Algorithm design and analysis, Training
Paper Title: RASPBERRY PI BASED GLOBAL INDUSTRIAL PROCESS MONITORING THROUGH WIRELESS COMMUNICATION
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRTNTSE006
Register Paper ID - 181643
Title: RASPBERRY PI BASED GLOBAL INDUSTRIAL PROCESS MONITORING THROUGH WIRELESS COMMUNICATION
Author Name(s): A.Narmada
Publisher Journal name: IJCRT
Volume: 6
Issue: 1
Pages: 27-32
Year: February 2018
Downloads: 2281
This paper proposes an advanced system for process management via a credit card sized single board computer called raspberry pi based multi parameter monitoring hardware system designed using RS232 and microcontroller that measures and controls various global parameters. Various kinds of sensors are utilized in order to control and monitor the various kinds of hazards that occur during industrial process. The system comprises of a single master and multiple slaves with wireless mode of communication and a raspberry pi system that can either operate on windows or Linux operating system. The parameters that can be tracked are current, voltage, temperature, light intensity and water level. The hardware design is done with the surface mount devices (SMD) on a double layer printed circuit board (PCB) to reduced the size and improve the power efficiency. The various interesting features are field device communication via USB-OTG enabled Android devices, on field firm ware update without any specific hardware and remote monitoring and control. Remote monitoring is also performed by connecting a web server to the raspberry kit and establishing a secure wireless connection to all the sensors used. With the updated security channels one can continuously track the process occurring in industries.
Licence: creative commons attribution 4.0
Raspberry pi, wireless industrial automation, PCB, SMD, wireless channels, sensors.
Paper Title: A FRAME WORK FOR HETEROGENEOUS WIRELESS NETWORKS USING FAST VERTICAL HANDOVER
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRTNTSE005
Register Paper ID - 181637
Title: A FRAME WORK FOR HETEROGENEOUS WIRELESS NETWORKS USING FAST VERTICAL HANDOVER
Author Name(s): M.Naresh,
Publisher Journal name: IJCRT
Volume: 6
Issue: 1
Pages: 20-26
Year: February 2018
Downloads: 2299
In recent years, mobile and wireless networks play a vital role .Heterogeneous wireless networks(HWN) communication is a combination of various heterogeneous networks. User fulfillment is significantly affected by the aspect such as terminal mobility, guaranteeing QOS continuous connectivity to access the world anywhere, anytime and any service has gained a significant weight. Seamless internetworking of heterogeneous network is still a stimulating assignment and requires interconnectivity at all layers of network architecture. In mobile communication, seamless vertical handover is one of the most challenging issues. The worst case may cause communication interruption, delays and packet losses which affect the real time communication performance. To resolve the problem, a marginal fast vertical handover Mobile IP (MIP) protocol using IEEE 802.21 Media Independent Handover (MIH) standard is proposed on heterogeneous WLAN/WiMAX networks.
Licence: creative commons attribution 4.0
MIH, QOS, Vertical handover, MIP, HWN
Paper Title: TRANSPARENT AUDIO WATERMARKING USING FIBONACCI SERIES USING IMAGE ENCRYTION
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRTNTSE004
Register Paper ID - 181635
Title: TRANSPARENT AUDIO WATERMARKING USING FIBONACCI SERIES USING IMAGE ENCRYTION
Author Name(s): Vijetha Kura
Publisher Journal name: IJCRT
Volume: 6
Issue: 1
Pages: 11-19
Year: February 2018
Downloads: 2308
This paper will present a audio watermarking method which is highly secured and offers triple layer protection and has very large virtual capacity and large imperceptibility in which watermark/data i.e. an image can be encrypted and hidden by modifying the magnitude values in FFT spectrum. The main idea is to modify magnitude of FFT samples with respect to Fibonacci series .Here an image will be encrypted and is embedded into audio which improves the security of watermarking drastically. XOR sum of image bits and PN sequence is used as embedding bit stream and is chosen as it is fastest and simple in computation when compared to other encryption techniques. XOR sum creates a huge virtual increase in payload or capacity of the algorithm. This technique mathematically proves that maximum changes in FFT samples is less than 61% and the average error rate considering a single sample is 25% .This technique is not only robust and transparent but also highly secured. The additional feature is its ability to handle large capacity i.e. from experimentally its proved to handle 700bps to 3kpbs efficiently, moreover this technique is blind, i.e. original signal is not required near receiver.
Licence: creative commons attribution 4.0
Audio watermarking, FFT, Image encryption, PN sequence, XOR sum.
Paper Title: A NOVEL SVD-BASED WATERMARKING SCHEME USING DWT
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRTNTSE003
Register Paper ID - 181577
Title: A NOVEL SVD-BASED WATERMARKING SCHEME USING DWT
Author Name(s): Dr.M.Sushanth Babu
Publisher Journal name: IJCRT
Volume: 6
Issue: 1
Pages: 6-10
Year: February 2018
Downloads: 2387
In this paper, a watermarking system is proposed by using SVD (Singular Value Decomposition) and DWT (Discrete Wavelet Transform). Along with additional methods in literature, SVD is used for various applications. In addition to usual hiding arrangements a random moniker is utilized to increase its heftiness in contradiction to unnecessary burglars. The unitary matrices are utilized to produce a moniker which is going to be embedded into the fourth level decomposition of shield image. After extraction, an image is checked with the Moniker embedded. If these Monikers are harmonized the unitary matrices will be used to excerpt watermark from the watermarked image. Diverse attacks are well-thought-out and the simulation outcomes show that the extraction of watermark after attacks had minor effect only.
Licence: creative commons attribution 4.0
Encryption, Authentication, Moniker, SVD, Watermarking
Paper Title: DESIGN OF 3 ELEMENT YAGI - UDA ANTENNA FOR RFID APPLICATIONS
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRTNTSE002
Register Paper ID - 181632
Title: DESIGN OF 3 ELEMENT YAGI - UDA ANTENNA FOR RFID APPLICATIONS
Author Name(s): M.M.Prasada Reddy
Publisher Journal name: IJCRT
Volume: 6
Issue: 1
Pages: 3-5
Year: February 2018
Downloads: 3556
This paper presents the design of 3 element Yagi Uda antenna at 400MHz frequency for UHF (RFID) applications. The antenna has one active element(dipole antenna), one reflector(passive element ) and 3 directors (passive elements).Adjusting the spacing between elements 50% of improvement in impedance band width,0.6 dBi improvement in gain and directivity is achieved. The antenna design is simulated in CST microwave studio.
Licence: creative commons attribution 4.0
Yagi- Uda,gain ,directivity,Band Width,reflector, dipole,director and CST studio.
Paper Title: A BROADBAND MICROSTRIP ANTENNA WITH CAPACITIVE COUPLING FOR C-BAND APPLICATIONS
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRTNTSE001
Register Paper ID - 181630
Title: A BROADBAND MICROSTRIP ANTENNA WITH CAPACITIVE COUPLING FOR C-BAND APPLICATIONS
Author Name(s): Dr. Nukala Srinivasa Rao
Publisher Journal name: IJCRT
Volume: 6
Issue: 1
Pages: 1-3
Year: February 2018
Downloads: 2304
In this paper we present the design and simulation of co-axial fed microstrip antenna for C-Band (4-8 GHz) application with capacitive coupling technique. The antenna designed from antenna theory (calculation) for centre frequency 5.6 GHz and later optimized for broadband using HFSS software. Dielectric substrate FR-4 proxy having dielectric constant 4.4 is used. The proposed antenna exhibits a much higher impedance bandwidth 53% (S11<-10dB).
Licence: creative commons attribution 4.0
C-Band, impedance bandwidth, Co-axial feed
The International Journal of Creative Research Thoughts (IJCRT) aims to explore advances in research pertaining to applied, theoretical and experimental Technological studies. The goal is to promote scientific information interchange between researchers, developers, engineers, students, and practitioners working in and around the world.
Indexing In Google Scholar, ResearcherID Thomson Reuters, Mendeley : reference manager, Academia.edu, arXiv.org, Research Gate, CiteSeerX, DocStoc, ISSUU, Scribd, and many more International Journal of Creative Research Thoughts (IJCRT) ISSN: 2320-2882 | Impact Factor: 7.97 | 7.97 impact factor and ISSN Approved. Provide DOI and Hard copy of Certificate. Low Open Access Processing Charges. 1500 INR for Indian author & 55$ for foreign International author. Call For Paper (Volume 13 | Issue 11 | Month- November 2025)

