M. Jayakumar
YOU?
Author Swipe
View article: DUAL CIRCULARLY POLARIZED BROADBAND MICROSTRIP ANTENNA ARRAY FOR SPACE RE-ENTRY VEHICLE APPLICATIONS IN S BAND
DUAL CIRCULARLY POLARIZED BROADBAND MICROSTRIP ANTENNA ARRAY FOR SPACE RE-ENTRY VEHICLE APPLICATIONS IN S BAND Open
This paper presents the design details of an integrated 4x4 element dual feed dual circularly polarized microstrip antenna array in the S-band. The dual circular polarization is achieved by the use of quadrature hybrids. Power division for…
View article: Low Noise Amplifier at 60 GHz Using Low Loss On-Chip Inductors
Low Noise Amplifier at 60 GHz Using Low Loss On-Chip Inductors Open
This paper proposes the technique of using low loss on-chip inductors in the design of low noise amplifier (LNA) that offers high gain and lower noise figure. Upon the substrate of octagonal spiral inductors, a surface of patterned ground …
View article: Hexagonal-Triangular Combinatorial Structure Based Dual-Band Circularly Polarized Patch Antenna for GAGAN Receivers
Hexagonal-Triangular Combinatorial Structure Based Dual-Band Circularly Polarized Patch Antenna for GAGAN Receivers Open
A multilayer gap-coupled dual-band hexagonal microstrip patch antenna is presented for GPS Aided GEO Augmented Navigation (GAGAN) receivers. GAGAN is developed by AAI (Airport Authority of India) and ISRO (Indian Space Research Organizatio…
View article: Lightweight PUF-Based Gate Replacement Technique to Reduce Leakage of Information through Power Profile Analysis
Lightweight PUF-Based Gate Replacement Technique to Reduce Leakage of Information through Power Profile Analysis Open
The major challenge faced by electronic device designers is to defend the system from attackers and malicious modules called Hardware Trojans and to deliver a secured design. Although there are many cryptographic preventive measures in pla…
View article: Key less physical layer security for wireless networks: A survey
Key less physical layer security for wireless networks: A survey Open
Physical layer security (PLS) has become the kernel concept for ensuring wireless network security. The main goal of this treatise is to provide a systematic classification of key less schemes. We have classified key less PLS into code, ch…
View article: Data Augmented Hardware Trojan Detection Using Label Spreading Algorithm Based Transductive Learning for Edge Computing-Assisted IoT Devices
Data Augmented Hardware Trojan Detection Using Label Spreading Algorithm Based Transductive Learning for Edge Computing-Assisted IoT Devices Open
IoT devices handle a large amount of information including sensitive information pertaining to the deployed application. Such a scenario, makes IoT devices susceptible to various attacks. In addition to securing IoT devices, it is equally …
View article: Centralised Fractional Order Lqi Controller Design for Quadruple Tank Process - an Optimisation Approach
Centralised Fractional Order Lqi Controller Design for Quadruple Tank Process - an Optimisation Approach Open
View article: Estimation and Compensation of IQ Imbalance in SWIPT System
Estimation and Compensation of IQ Imbalance in SWIPT System Open
Although there are many articulations of SWIPT architecture implementations, the hardware impairment aspect involved in the SWIPT architecture system is not given much attention. This paper evaluates the performance of SWIPT PS Reciever ar…
View article: Secret Key Generation Schemes for Physical Layer Security
Secret Key Generation Schemes for Physical Layer Security Open
Physical layer security (PLS) has evolved to be a pivotal technique in ensuring secure wireless communication. This paper presents a comprehensive analysis of the recent developments in physical layer secret key generation (PLSKG). The pri…
View article: FAST ESTIMATE OF PLANE WAVE ATTENUATION OF CONDUCTIVE POWDERS FOR RAPID DEPLOYMENT OF CUSTOMIZED CEMENT BASED MICROWAVE ABSORBING SOLUTIONS
FAST ESTIMATE OF PLANE WAVE ATTENUATION OF CONDUCTIVE POWDERS FOR RAPID DEPLOYMENT OF CUSTOMIZED CEMENT BASED MICROWAVE ABSORBING SOLUTIONS Open
View article: Link distance-support vector regression (LD-SVR) based device free localization technique in indoor environment
Link distance-support vector regression (LD-SVR) based device free localization technique in indoor environment Open
Indoor localization using device free localization (DFL) in wireless sensor networks is gaining momentum nowadays due to the potential benefits of DFL. The techniques used in DFL can be broadly classified as statistical methods, compressiv…
View article: Device Free Localisation Techniques in Indoor Environments
Device Free Localisation Techniques in Indoor Environments Open
The location estimation of a target for a long period was performed only by device based localisation technique which is difficult in applications where target especially human is non-cooperative. A target was detected by equipping a devic…
View article: Finding Trusted Node in Mobile Ad-Hoc Network
Finding Trusted Node in Mobile Ad-Hoc Network Open
International Journal of Computer Sciences and Engineering (A UGC Approved and indexed with DOI, ICI and Approved, DPI Digital Library) is one of the leading and growing open access, peer-reviewed, monthly, and scientific research journal …
View article: Detection of Malicious Circuitry using Transition Probability Based Node Reduction Technique
Detection of Malicious Circuitry using Transition Probability Based Node Reduction Technique Open
In recent years, serious concerns have been raised against the tampering of integrated circuits due to outsourcing of circuits for fabrication. It has led to the addition of malicious circuitry known as Hardware Trojan. In this paper, a tr…
View article: Emulation of Channel Model and Estimation for MIMO based Satellite Land Mobile System using Software Defined Radio
Emulation of Channel Model and Estimation for MIMO based Satellite Land Mobile System using Software Defined Radio Open
Land mobile satellite system (LMS) with multiantenna setup is explored in order to achieve better performance reliability and increase in capacity. The prime objective of this work is to emulate the channel accounting for channel effects f…
View article: Design and Performance Analysis of Hairpin Bandpass Filter for Satellite Applications
Design and Performance Analysis of Hairpin Bandpass Filter for Satellite Applications Open
In this paper, a hairpin bandpass filter using coupled lines is designed for satellite applications. Initially, a conventional microstrip parallel coupled line filter is modified as hairpin based folded coupled line filter that works in S-…
View article: Indoor Robot Localisation using Kalman Filter
Indoor Robot Localisation using Kalman Filter Open
Objective of this paper is to reduce the error in the estimation of the position of the robot. The localization of robot is a critical aspect in making them completely autonomous. Hence accuracy in estimating the position of the robot is o…
View article: Design of Cascaded Common Source Low Noise Amplifier for S-Band using Transconductance Feedback
Design of Cascaded Common Source Low Noise Amplifier for S-Band using Transconductance Feedback Open
Background/Objectives: Now-a-days advancements in CMOS technology increase the demand on transceiver design in the aspect of gain, linearity, power, re-configurability and cost-effectiveness1 . The performance of RF frontend of transceiver…
View article: SMART GRID TECHNOLOGIES Performance Studies and Review of Millimeter Wave MIMO Beamforming at 60 GHz
SMART GRID TECHNOLOGIES Performance Studies and Review of Millimeter Wave MIMO Beamforming at 60 GHz Open
View article: Performance Studies and Review of Millimeter Wave MIMO Beamforming at 60 GHz
Performance Studies and Review of Millimeter Wave MIMO Beamforming at 60 GHz Open
Millimeter wave systems offer high date rate due to huge bandwidth but suffers from poor link budget. This is due to the blockage of the millimeter wave signal by the obstacles of size comparable to that of the wavelength of the signal. Va…