Government Women Engineering College

Ajmer, India

Government Women Engineering College

Ajmer, India

Time filter

Source Type

Sharma M.M.,Government Engineering College | Deegwal J.K.,Suresh Gyan Vihar University | Kumar A.,Government Women Engineering College | Govil M.C.,Malaviya National Institute of Technology, Jaipur
Progress In Electromagnetics Research C | Year: 2014

A compact planar monopole UWB antenna with quadruple band-notched characteristics is analyzed and presented. By introducing a C-shaped slot, nested C-shaped slot in the radiating patch and U-shaped slot in the feed line, quadruple band-notched characteristics are achieved at frequencies of 2.5, 3.7, 5.8 and 8.2 GHz. The proposed antenna has been fabricated and tested. Measured impedance bandwidth of the antenna is 2.35-12 GHz, which covers Bluetooth and UWB band, for VSWR < 2 and also has four stop bands of 2.44-2.77, 3.42-3.97, 5.45-5.98 and 8-8.68 GHz, for VSWR > 2, for rejecting 2.5/3.5 GHz WiMAX, WLAN and ITU 8 GHz band signals, respectively. The average gain of this antenna is 4.30 dBi with a variation of ±1.8 dBi over the whole impedance bandwidth. Significant gain reduction over the rejected band is also observed. The antenna shows good omnidirectional radiation patterns in the passband with a compact size of 40 mm × 34 mm.

Saxena G.,Government Women Engineering College | Singh D.,University of Rajasthan
International Journal of Modern Physics E | Year: 2013

Encouraged by the success of relativistic mean-field plus BCS (RMF + BCS) approach for the description of the ground state properties of the chains of isotopes of proton magic nuclei with proton number Z = 8, 20, 28, 50 and 82 as well as those of proton sub-magic nuclei with Z = 40, we have further employed it, in an analogous manner, for a detailed calculations of the ground state properties of the neutron magic isotones with neutron number N = 8, 20, 28, 50, 82 and 126 as well as those of neutron sub-magic isotones with N = 40 using the TMA force parametrizations in order to explore low lying resonance and other exotic phenomenon near drip-lines. The results of these calculations for wave function, single particle pairing gaps etc. are presented here to demonstrate the general validity of our RMF + BCS approach. It is found that, in some of the proton-rich nuclei in the vicinity of the proton drip-line, the main contribution to the pairing correlations is provided by the low-lying resonant states, in addition to the contributions coming from the states close to the Fermi surface, which results extended proton drip-line for isotonic chain. © 2013 World Scientific Publishing Company.

Verma K.,Petronas University of Technology | Hasbullah H.,Petronas University of Technology | Kumar A.,Government Women Engineering College
Wireless Personal Communications | Year: 2013

Privacy and Security have become an indispensable matter of attention in the Vehicular Ad-Hoc Network, which is vulnerable to many security threats these days. One of them is the Denial of Service (DoS) attacks, where a malicious node forges a large number of fake identities, i.e.; Internet Protocol (IP) addresses in order to disrupt the proper functioning of fair data transfer between two fast-moving vehicles. In this paper, a distributed and robust approach is presented to defend against DoS attacks. In this proposed scheme, the fake identities of malicious vehicles are analyzed with the help of consistent existing IP address information. Beacon packets are exchanged periodically by all the vehicles to announce their presence and to become aware of the next node. Each node periodically keeps a record of its database by exchanging the information in its environment. If some nodes observe that they have similar IP addresses in the database, these similar IP addresses are identified as DoS attacks. However, it can be expected that security attacks are likely to increase in the coming future due to more and more wireless applications being developed onto the well-known exposed nature of the wireless medium. In this respect, the network availability is exposed to many types of attacks. A DoS attack on the network availability is being elaborated in this paper. A model of a product interaction for DoS prevention has been developed called "IP-CHOCK" that will lead to the prevention of DoS attacks. The proposed approach will be able to locate malicious nodes without the requirement of any secret information exchange and special hardware support. Simulation results demonstrate that the detection rate increases when optimal numbers of nodes are forged by the attackers. © 2013 Springer Science+Business Media New York.

Singh D.,University of Rajasthan | Saxena G.,Government Women Engineering College
International Journal of Modern Physics E | Year: 2012

Inspired by recent experimental studies of two-proton radioactivity in the light-medium mass region, we have employed relativistic mean-field plus state-dependent BCS approach (RMF+BCS) to study the ground state properties of selected even-Z nuclei in the region 20 ≤ Z ≤ 40. It is found that the effective potential barrier provided by the Coulomb interaction and that due to centrifugal force may cause a long delay in the decay of some of the nuclei even with small negative proton separation energy. This may cause the existence of proton-rich nuclei beyond the proton drip-line. Nuclei 38Ti, 42Cr, 45Fe, 48Ni, 55Zn, 60Ge, 63, 64Se, 68Kr, 72Sr and 76Zr are found to be the potential candidates for exhibiting two-proton radioactivity in the region 20 ≤ Z ≤ 40. The reliability of these predictions is further strengthened by the agreement of the calculated results for the ground state properties such as binding energy, one- and two-proton separation energy, proton and neutron radii, and deformation with the available experimental data for the entire chain of the isotopes of the nuclei in the region 20 ≤ Z ≤ 40. © 2012 World Scientific Publishing Company.

Verma P.,Government Women Engineering College | Yadav A.,Government Women Engineering College
International Conference on Computing, Communication and Automation, ICCCA 2015 | Year: 2015

Now a day the technological grow up motivated to researcher for 24∗7 facility without the physical support. To achieved such a parameters, scientist and laboratory person continuing the research into Ubiquitous computing that facilitate the anywhere anytime communication. To deploy the set up of Ubiquitous environments, we first need to deep analysis of pattern that followed the building then we established the network. The pervasive techniques of wearable devise and interaction with interfacing technology of HCI is used for betterment of ubiquitous environments. In this paper, author has given the basic fundamental of ubiquitous computing and highlighted the configuration parameters that have been used for best results is discussed. Author purposed a novel technique for location measurements and best configuration practices regards to ubiquitous computing. © 2015 IEEE.

Dhaka R.,Government Women Engineering College
Proceedings - 2014 6th International Conference on Computational Intelligence and Communication Networks, CICN 2014 | Year: 2014

Design and analysis of ultrahigh birefringent photonic crystal fiber having low confinement loss and nearly zero dispersion characteristics has been presented. The suggested design has phosphate glass rectangular slab surrounded by rectangular array of four air holes in core region and circular air holes in the cladding region. Photonic crystal fiber structure is designed, simulated and analyzed by using opti FDTD simulation software. The proposed design shows ultrahigh birefringence (~0.023) and low confinement loss at 1.55μm. Such high value of birefringence eliminates fluctuation in polarization state. © 2014 IEEE.

Jyotiyana P.,Government Women Engineering College | Maheshwari S.,Government Women Engineering College
Advances in Intelligent Systems and Computing | Year: 2016

Malware is a malignant code that expands over the connected frameworks in system. Malvertising is a malicious action that can distribute malware in different forms through advertising. Malware is the key of advertising and generate the revenue and for various Internet organizations, extensive advertisement systems; for example, Google, Yahoo and Microsoft contribute a ton of effort to moderate malicious advertising from their advertise network systems. This paper specifically discusses various types of detection techniques; procedures and analysis techniques for detect the malware threat. Malware detection method used to detect or identify the malicious activities so that malware could not harm the user system. Moreover the study includes about malicious advertising. This paper will look at the strategies utilized by adware as a part of their endeavours to stay inhabitant on the framework and analyze the sorts of information being separated from the client's framework. © Springer International Publishing AG 2016.

Dhaka R.,Government Women Engineering College
Proceedings - 2014 6th International Conference on Computational Intelligence and Communication Networks, CICN 2014 | Year: 2014

In this work, a highly birefringent photonic crystal fiber with ultra low confinement loss using silica is proposed. The birefringence is achieved by introducing the asymmetry along the radial axis. The symmetric cladding structure results in very low confinement loss by limiting the light in the core region. The proposed design is analyzed and simulated using FDTD simulation software and the fiber shows high birefringence (0.0073) and ultra low confinement loss (0.003 dB/km) at 1.55μm wavelength, which makes the photonic crystal fiber endlessly single mode fiber and highly polarization maintaining. © 2014 IEEE.

Misra R.,Malaviya National Institute of Technology, Jaipur | Bansal V.,Government Women Engineering College | Agrawal G.D.,Malaviya National Institute of Technology, Jaipur | Mathur J.,Malaviya National Institute of Technology, Jaipur | Aseri T.K.,Government Engineering College
Applied Energy | Year: 2013

Thermal performance of Earth Air Tunnel Heat Exchanger (EATHE) under transient operating conditions has been evaluated for predominantly hot and dry climate of Ajmer (India) using experimental and Computational Fluid Dynamics modeling. Effects of time duration of continuous operation, thermal conductivity of soil pipe diameter and flow velocity on thermal performance of EATHE under transient conditions have been analyzed. Results show that the transient thermal performance of EATHE is significantly dependent on thermal conductivity of the soil and duration of its continuous operation. The analyzed cases have shown the range of derating to be as minimal as 0% to as high as 64%, which if ignored while designing may lead to poor performance of EATHE. Study reveals that the effect of pipe diameter due to prolonged use of EATHE system on its thermal performance is least in case of soil with higher value of thermal conductivity. Results show that the increase in flow velocity leads to deterioration in thermal performance of EATHE system. Under steady state condition, drop of 18.8°C in air temperature is obtained, whereas, under transient conditions cooling of air reduces from 18.7°C to 16.6°C for soil thermal conductivity of 0.52Wm-1K-1, after 24h of continuous operation. © 2012 Elsevier Ltd.

Sharma S.S.,Government Women Engineering College
AIP Conference Proceedings | Year: 2013

In this paper, we report the photovoltaic response of the solution processed DBPYM: PCBM bulk heterojunction (BHJ) solar cell. The BHJ showed power conversion efficiency (PCE) up to 2.11 %. The PCE has been further improved up to 2.93 % after thermal annealing of the DBPYM: PCBM layer. The increase in the PCE with the thermally annealed blend is mainly attributed to the improvement in incident photon to current efficiency (IPCE) and short circuit photocurrent (Jsc). Thermal annealing leads to an increase in both the crystallinity of the blend and hole mobility, which improves the PCE. © 2013 AIP Publishing LLC.

Loading Government Women Engineering College collaborators
Loading Government Women Engineering College collaborators