Time filter

Source Type

Gurgaon, India

Swamee P.K.,Northcap University | Rathie P.N.,Federal University of Ceara
Journal of Irrigation and Drainage Engineering | Year: 2016

Normal depth is a key parameter occurring in open-channel hydraulics. For all practical canal sections, open-channel resistance equation involves implicit form for normal depth. Therefore, the determination of the normal depth involves the tedious method of trial and error. Presented in this paper is the good approximate explicit equation for normal depth in parabolic open-channel sections. © 2016 American Society of Civil Engineers.

Puri P.,Jaypee Institute of Information Technology | Garg P.,Netaji Subhas Institute of Technology | Aggarwal M.,Northcap University
Journal of Optical Communications and Networking | Year: 2016

In this paper, various multiuser scheduling schemes are applied to a two-way relay (TWR) assisted multiple user pair free-space optical (FSO) communication network, when the optical beam is subjected to path loss, misalignment errors, and atmospheric turbulence. The FSO network consists of a single, half-duplex, decode-and-forward, two-way optical relay that serves multiple user pairs by employing a scheduler. Three types of schedulers based on absolute signal-to-noise ratio (SNR), normalized SNR, and selective multiuser diversity are considered. Further, the atmospheric turbulence is modeled by a recently proposed statistical model, namely the Málaga M-distribution. For the presented system and channel models, closed-form and asymptotic expressions for outage probability and bit error rate are derived. The mathematical analysis is accompanied by Monte Carlo simulations and several numerical examples to illustrate the effect of the key system parameters. © 2009-2012 OSA.

Mehta A.,University of New South Wales | Ramer R.,University of New South Wales | Gong L.,University of New South Wales | Sachdeva S.,Northcap University
Asia Pacific Conference on Postgraduate Research in Microelectronics and Electronics | Year: 2015

A low cost high-efficient microstrip line fed antenna for 60 GHz communications is presented. An investigation for microstrip antenna presently being working at lower microwave frequency has been done for 60 GHz communication. A new geometry has been presented in form of H shaped design with feeding from microstrip line. The results have been simulated using high frequency structural simulator (HFSS).There is a comparison between two antennas one with superstrate and one without superstrate is also presented. The use of superstrate has resulted in improved bandwidth and increased gain. The presented antennas are for broadband communications offering 6.3 GHz and 7.1 GHz bandwidth for one without and one with superstrate respectively. © 2015 IEEE.

Chundawat T.S.,University of Delhi | Chundawat T.S.,Northcap University | Sharma N.,University of Delhi | Kumari P.,University of Delhi | Bhagat S.,University of Delhi
Synlett | Year: 2016

A novel, highly efficient, and one-pot microwave-assisted synthesis of 2,4,5-trisubstituted imidazoles using a newly developed Schiff's base complex nickel catalyst (Ni-C) is described. The approach involves the reaction of various aldehydes with benzil and ammonium acetate in the presence of the Ni-C catalyst to furnish cyclized products in excellent yields. The Ni-C catalyst exhibited remarkable catalytic activity with respect to the reaction time in the microwave reactor. The catalyst could be easily recovered by simple filtration and reused. © Georg Thieme Verlag Stuttgart.

An asymmetric scheme has been proposed for optical double images encryption in the gyrator wavelet transform (GWT) domain. Grayscale and binary images are encrypted separately using double random phase encoding (DRPE) in the GWT domain. Phase masks based on devil's vortex Fresnel Lens (DVFLs) and random phase masks (RPMs) are jointly used in spatial as well as in the Fourier plane. The images to be encrypted are first gyrator transformed and then single-level discrete wavelet transformed (DWT) to decompose LL,HL,LH and HH matrices of approximation, horizontal, vertical and diagonal coefficients. The resulting coefficients from the DWT are multiplied by other RPMs and the results are applied to inverse discrete wavelet transform (IDWT) for obtaining the encrypted images. The images are recovered from their corresponding encrypted images by using the correct parameters of the GWT, DVFL and its digital implementation has been performed using MATLAB 7.6.0 (R2008a). The mother wavelet family, DVFL and gyrator transform orders associated with the GWT are extra keys that cause difficulty to an attacker. Thus, the scheme is more secure as compared to conventional techniques. The efficacy of the proposed scheme is verified by computing mean-squared-error (MSE) between recovered and the original images. The sensitivity of the proposed scheme is verified with encryption parameters and noise attacks. © 2016 Elsevier Ltd.

Discover hidden collaborations