MANAS KUMAR HALDAR - Academia.edu (original) (raw)
Uploads
Papers by MANAS KUMAR HALDAR
Journal of Electrical Engineering
The aim of this paper proposes an orthogonal frequency-division multiplexing (OFDM) with network ... more The aim of this paper proposes an orthogonal frequency-division multiplexing (OFDM) with network coding to improve the error performance of the system when the messages are transmitted from user to receiver. Two-way relay (TWR) networks are applied to reduce the transmission time slots. The exclusive-OR (XOR) coding is used for network coding in which source nodes exchange their information via TWR nodes. The XOR coded bits provides redundancy to achieve the transmit diversity gain which improves the error performance of the TWR network. OFDM is exploited for TWR to obtain the frequency selective fading nature of wireless channels. The different modulation schemes such as Quadrature Phase Shift Keying (QPSK), 16-Quadrature Amplitude Modulation (QAM) and 64-QAM with OFDM system are simulated and QPSK is selected as it gives the lowest bit error rate (BER). The multiple relaying schemes with different numbers of the information packets are also considered in this paper. Simulation res...
International Journal of Communication Systems
Journal of Electrical Engineering
Paper aims to enhance the performance of bit error rate (BER) in wireless communication based on ... more Paper aims to enhance the performance of bit error rate (BER) in wireless communication based on the multiple-input multiple-output (MIMO) system of vertical Bell laboratories layered space-time (VBLAST) algorithm. The VBLAST algorithm uses zero-forcing (ZF) and the minimum mean square error (MMSE) to evaluate the BER of wireless communication. MIMO VBLAST techniques function as an adaptive filter and can minimize the interference and multipath fading in the received signal of the channel. Physical layer network coding (PNC) is a new technique used to exploit the spatial diversity of the MIMO VBLAST system to improve the throughput and performance of wireless communication. The bit-error-rate (BER) of proposed VBLAST MIMO with PNC with binary phase-shift keying (BPSK) and quadrature phase-shift keying (QPSK) modulation over the additive white Gaussian noise and Rayleigh fading channel are analyzed. The performance of both BPSK and QPSK modulation in two and four antennas are compare...
International Journal of Image and Graphics
Now-a-days, biometric systems have replaced the password or token based authentication system in ... more Now-a-days, biometric systems have replaced the password or token based authentication system in many fields to improve the security level. However, biometric system is also vulnerable to security threats. Unlike password based system, biometric templates cannot be replaced if lost or compromised. To deal with the issue of the compromised biometric template, template protection schemes evolved to make it possible to replace the biometric template. Cancelable biometric is such a template protection scheme that replaces a biometric template when the stored template is stolen or lost. It is a feature domain transformation where a distorted version of a biometric template is generated and matched in the transformed domain. This paper presents a review on the state-of-the-art and analysis of different existing methods of biometric based authentication system and cancelable biometric systems along with an elaborate focus on cancelable biometrics in order to show its advantages over the st...
IEE Proceedings C Generation, Transmission and Distribution
IEE Proceedings C Generation, Transmission and Distribution
ABSTRACT
ABSTRACT We have recently improved a two level model of a quantum cascade laser. The two level mo... more ABSTRACT We have recently improved a two level model of a quantum cascade laser. The two level model is simpler than the 3- level model reported earlier. We calculated the intensity modulation of a laser emitting light of wavelength 5m. As the laser considered is rather old, we consider a more recent quantum cascade laser and examine its intensity modulation response.
Optical Engineering
Analytical techniques for determining intermodulation distortion in directly modulated semiconduc... more Analytical techniques for determining intermodulation distortion in directly modulated semiconductor lasers are examined. Direct expressions for the two- and three-frequency third- order intermodulation distortion-to-carrier ratios are used to check the validity of a well- known 6-dB difference formula. It is found that this formula is not always valid, the discrepancy being a function of laser diode parameters and subcarrier spacing. The carrier-to- intermodulation-noise ratios are computed for a 25-channel subcarrier multiplexed system, with subcarrier spacings of 6 MHz for amplitude modulation and 40 MHz for frequency modulation, and it is found that the central subcarrier is not always the worst affected, although it has the maximum number of interfering intermodulation products. This is in contrast to memoryless nonlinearities where the central subcarrier may be expected to have the worst carrier-to-intermodulation-noise ratio.
IOP Conference Series: Materials Science and Engineering
International Journal of Electrical Engineering Education
IOP Conference Series: Materials Science and Engineering
Journal of Optical Communications
Journal of Optical Communications
ABSTRACT
Journal of Optical Communications
Journal of Computing and Information Technology, 2017
International Journal of Electronic Government Research, 2016
Though there are online voting systems available, the authors propose a new and secure steganogra... more Though there are online voting systems available, the authors propose a new and secure steganography based E2E (end-to-end) verifiable online voting system, to tackle the problems in voting process. This research implements a novel approach to online voting by combining visual cryptography with image steganography to enhance system security without degrading system usability and performance. The voting system will also include password hashed-based scheme and threshold decryption scheme. The software is developed on web-based Java EE with the integration of MySQL database server and Glassfish as its application server. The authors assume that the election server used and the election authorities are trustworthy. A questionnaire survey of 30 representative participants was done to collect data to measure the user acceptance of the software developed through usability testing and user acceptance testing.
2012 Asia Pacific Microwave Conference Proceedings, Dec 1, 2012
ABSTRACT
Asia Pacific Microwave Conference 2011, Dec 5, 2011
ABSTRACT
Journal of Electrical Engineering
The aim of this paper proposes an orthogonal frequency-division multiplexing (OFDM) with network ... more The aim of this paper proposes an orthogonal frequency-division multiplexing (OFDM) with network coding to improve the error performance of the system when the messages are transmitted from user to receiver. Two-way relay (TWR) networks are applied to reduce the transmission time slots. The exclusive-OR (XOR) coding is used for network coding in which source nodes exchange their information via TWR nodes. The XOR coded bits provides redundancy to achieve the transmit diversity gain which improves the error performance of the TWR network. OFDM is exploited for TWR to obtain the frequency selective fading nature of wireless channels. The different modulation schemes such as Quadrature Phase Shift Keying (QPSK), 16-Quadrature Amplitude Modulation (QAM) and 64-QAM with OFDM system are simulated and QPSK is selected as it gives the lowest bit error rate (BER). The multiple relaying schemes with different numbers of the information packets are also considered in this paper. Simulation res...
International Journal of Communication Systems
Journal of Electrical Engineering
Paper aims to enhance the performance of bit error rate (BER) in wireless communication based on ... more Paper aims to enhance the performance of bit error rate (BER) in wireless communication based on the multiple-input multiple-output (MIMO) system of vertical Bell laboratories layered space-time (VBLAST) algorithm. The VBLAST algorithm uses zero-forcing (ZF) and the minimum mean square error (MMSE) to evaluate the BER of wireless communication. MIMO VBLAST techniques function as an adaptive filter and can minimize the interference and multipath fading in the received signal of the channel. Physical layer network coding (PNC) is a new technique used to exploit the spatial diversity of the MIMO VBLAST system to improve the throughput and performance of wireless communication. The bit-error-rate (BER) of proposed VBLAST MIMO with PNC with binary phase-shift keying (BPSK) and quadrature phase-shift keying (QPSK) modulation over the additive white Gaussian noise and Rayleigh fading channel are analyzed. The performance of both BPSK and QPSK modulation in two and four antennas are compare...
International Journal of Image and Graphics
Now-a-days, biometric systems have replaced the password or token based authentication system in ... more Now-a-days, biometric systems have replaced the password or token based authentication system in many fields to improve the security level. However, biometric system is also vulnerable to security threats. Unlike password based system, biometric templates cannot be replaced if lost or compromised. To deal with the issue of the compromised biometric template, template protection schemes evolved to make it possible to replace the biometric template. Cancelable biometric is such a template protection scheme that replaces a biometric template when the stored template is stolen or lost. It is a feature domain transformation where a distorted version of a biometric template is generated and matched in the transformed domain. This paper presents a review on the state-of-the-art and analysis of different existing methods of biometric based authentication system and cancelable biometric systems along with an elaborate focus on cancelable biometrics in order to show its advantages over the st...
IEE Proceedings C Generation, Transmission and Distribution
IEE Proceedings C Generation, Transmission and Distribution
ABSTRACT
ABSTRACT We have recently improved a two level model of a quantum cascade laser. The two level mo... more ABSTRACT We have recently improved a two level model of a quantum cascade laser. The two level model is simpler than the 3- level model reported earlier. We calculated the intensity modulation of a laser emitting light of wavelength 5m. As the laser considered is rather old, we consider a more recent quantum cascade laser and examine its intensity modulation response.
Optical Engineering
Analytical techniques for determining intermodulation distortion in directly modulated semiconduc... more Analytical techniques for determining intermodulation distortion in directly modulated semiconductor lasers are examined. Direct expressions for the two- and three-frequency third- order intermodulation distortion-to-carrier ratios are used to check the validity of a well- known 6-dB difference formula. It is found that this formula is not always valid, the discrepancy being a function of laser diode parameters and subcarrier spacing. The carrier-to- intermodulation-noise ratios are computed for a 25-channel subcarrier multiplexed system, with subcarrier spacings of 6 MHz for amplitude modulation and 40 MHz for frequency modulation, and it is found that the central subcarrier is not always the worst affected, although it has the maximum number of interfering intermodulation products. This is in contrast to memoryless nonlinearities where the central subcarrier may be expected to have the worst carrier-to-intermodulation-noise ratio.
IOP Conference Series: Materials Science and Engineering
International Journal of Electrical Engineering Education
IOP Conference Series: Materials Science and Engineering
Journal of Optical Communications
Journal of Optical Communications
ABSTRACT
Journal of Optical Communications
Journal of Computing and Information Technology, 2017
International Journal of Electronic Government Research, 2016
Though there are online voting systems available, the authors propose a new and secure steganogra... more Though there are online voting systems available, the authors propose a new and secure steganography based E2E (end-to-end) verifiable online voting system, to tackle the problems in voting process. This research implements a novel approach to online voting by combining visual cryptography with image steganography to enhance system security without degrading system usability and performance. The voting system will also include password hashed-based scheme and threshold decryption scheme. The software is developed on web-based Java EE with the integration of MySQL database server and Glassfish as its application server. The authors assume that the election server used and the election authorities are trustworthy. A questionnaire survey of 30 representative participants was done to collect data to measure the user acceptance of the software developed through usability testing and user acceptance testing.
2012 Asia Pacific Microwave Conference Proceedings, Dec 1, 2012
ABSTRACT
Asia Pacific Microwave Conference 2011, Dec 5, 2011
ABSTRACT