International Conference On Progressive Research In Applied Sciences, Engineering And Technology (ICPRASET 2K18)
(Volume-6)

ECE

 

  • Citation
  • Abstract
  • Refrences
  • View
Title
::
Mobility Aware Caching In D2d Networks
Country
::
India
Authors
::
V.Ranjitha || K.Vetri Selvi || S.Kumaran M.E
Page
::
01-03

Recent Trends Show That Internet Traffic Is Increasingly Day By Day, Which Is Accompanied By The Exponential Growth Of Traffic. To Cope With This Phenomena, Network Caching Is Introduced To Utilize The Storage Capacity Of Diverse Network Devices. In This Paper, We First Summarize Four Basic Caching Placement Strategies, I.E., Local Caching, Device-To-Device (D2d) Caching, Small Cellbase Station (Sbs) Caching And Macrocell Base Station (Mbs) Caching. However, Studies Show That So Far, Much Of The Research Has Ignored The Impact Of User Mobility. Therefore, Taking The Effect Of The User Mobility Into Consideration, We Proposes A Joint Mobility-Aware Caching And Sbs Density Placement Scheme (Ms Caching). In Addition, Differences And Relationships Between Caching And Computation Offloading Are Discussed. We Present A Design Of A Hybrid Computation Of, Which Improved Performance In Terms Of Energy Cost. Finally, We Discuss The Design Of An Incentive Mechanism By Considering Network Dynamics, Differentiated User's Heterogeneity Of Mobile Terminals In Terms Of Caching And Computing Capabilities.

 

Keywords: -Caching; Computation Offloading; Human Mobility

[1]. J. LIU, B. BAI, J. ZHANG, AND K. B. LETAIEF, "CONTENT CACHING AT THE WIRELESS NETWORK EDGE: A DISTRIBUTED ALGORITHM VIA BRIEF PROPAGATION," IN PROC. IEEE INT. CONF. ON COMMUN. (ICC), KUALA LUMPUR, MALAYSIA,MAY 2016.

[2]. M. Ji, G. Caire, And A. Molisch, "Fundamental Limits Of Caching In Wireless D2d Networks," Ieee Trans. Inf. Theory, Vol. 62, No. 2, Pp.849 – 869, Feb. 2016.

[3]. X. Peng, J. Zhang, S. Song, And K. B. Letaief, "Cache Size Allocation In Backhaul Limited Wireless Networks," In Proc. Ieee Int. Conf. On Commun.(Icc), Kuala Lumpur, Malaysia, May 2016.

[4]. R. Wang, X. Peng, J. Zhang, And K. B. Letaief, "Mobility-Aware Caching For Content-Centric Wireless Networks: Modeling And Methodology," Ieee Commun. Mag., Vol. 54, No. 8, Pp. 77–83, Aug. 2016.

 

  • Citation
  • Abstract
  • Refrences
  • View
Title
::
An Algorithm for Dynamic SDN Controller in Data Centre Networks
Country
::
india
Authors
::
Nirmala || Oliveruth || Varun
Page
::
04-08

The Geographic And Opportunistic Routing With Depth Adjustment Based Topology Control For Communication Recovery Over Void Regions Uses The Greedy Opportunistic Forwarding To Route Packets And To Move Void Nodes To New Depths To Adjust The Topology. Simulation Results Shown That MANET Outperforms The Baseline Solutions In Terms Of Packet Delivery Ratio, Latency And Energy Per Message. The Objective Of The Topology Control Algorithm Is To Adjust The Transmission Power To Minimize Interference Taking Into Account The Delay Constraint Also To Find The Duplicate Data. To Minimize The Delay For Transmission Of Data. In Opportunistic Routing, Each Packet Is Broadcast To A Forwarding Set Composed Of Several Neighbours. The Packet Will Be Retransmitted Only If None Of The Neighbours In The Set Receives It. Opportunistic Routing Can Work Together With Geographic Routing And Improve Data Delivery.


Keywords: - AODV Algorithm, Cluster Forming, Data Centre Networks, Reliable Minimum Energy Routing, Software Defined Networks.

[1]. Bora Karaoglu, Tolga Numanoglu, And Wendi Heinzelman. Analytical Performance Of Soft Clustering Protocols. Ad Hoc
Networks, 9(4):635 – 651, 2011.
[2]. H. Liu, X. Chu, Y.-W. Leung, And R. Du, "Minimum-Cost Sensor Placement For Required Lifetime In Wireless Sensor-Target Surveillance Networks," IEEE Trans. Parallel Distrib. Syst., Vol. 24, No. 9, Pp. 1783–1796, Sep. 2012.

 

  • Citation
  • Abstract
  • Refrences
  • View
Title
::
Advanced Military Spying and Bomb Disposal Robot
Country
::
India
Authors
::
Senthamizh.R || Subbu Lakshmi.P || Subhashree.P || Prof. M.Priyadarshini
Page
::
09-11

In This Project We Are Going To Merge Two Applications That Is SPYING And BOMB DISPOSAL. Here A Camera Is Attached To The Mini Spy Robot. The Motors Will Be Run By The Relays Which Will Be Then Controlled Through Remote Via RF Module. The Work Is Designed To Develop A War Field Robot Which Is Capable Of Disposing Bombs Landmines In Its Path And Which Is Wirelessly Controlled Through RF Module. The Robot Can Be Moved In All The Directions Using The Remote Wirelessly. The Controlling Device Of The Whole System Is A ARDUINO. The Circuit Complexity Is Reduced And Performance Speed Is Increased By Using The Arduino. Whenever , Landmines Or Bombs Are Detected It Alerts Through Blinking Of LED's Of System. The Arduino Used In The Project Are Programmed Using Arduino Software Language. Just By Using A RF Module Enabled, The User Can Control The ADVANCED MILITARY SPYING AND BOMB DISPOSAL ROBOT From Any Area.

 

Keywords: - Bomb Disposal Sensor, Intelligent Robot And RF Module.

[1]. Dr. B.Subrahmanyeswara Rao, C.Soumya, G.Shamala Siresha, M. Sushma, N. Sai Priyanka"PC Controlled Bomb Detection And Diffusion Robot"International Journal Of Advanced Research In Electrical, Electronics And Instrumentation Engineering (An ISO 3297: 2007 Certified Organization)Vol. 5, Issue 4, April 2016.
[2]. Saurabh Nalwade "Robots For Surveillance In Military Applications"International Journal Of Electronics And Communication
Engineering & Technology (IJECET), ISSN 0976 –6464(Print), ISSN 0976 – 6472(Online), Volume 5, Issue 9, September (2014).
[3]. Ankita Patel, Kinjal Chaudhari, Dattukumar Patel "Touch Screen Controlled Multipurpose Spy Robot Using Zigbee"International Journal Of Advanced Research In Computer Engineering & Technology (IJARCET) Volume 3 Issue 4, March 2014.
[4]. Sagar Randive, Neha Lokhande, Apoorva Kamat , Shubhrojit Chakraborty, Vishal Pande "Hand Gesture Recognition Bomb
Diffusing Surveillance Robot" International Journal Of Engineering Research And Applications (IJERA) ISSN: 2248-9622
National Conference On Emerging Trends In Engineering & Technology (VNCET-30 Mar'12) .

 

  • Citation
  • Abstract
  • Refrences
  • View
Title
::
Detection Of Sudden Pedestrsin Crossing And Avoidance Of Vehicular Crashes
Country
::
India
Authors
::
U.Aiswarya || G.Keerthi || S.Kumaran M.E.
Page
::
12-14

Considered as a weak point in road and railway infrastructure, improving level crossings (LCs) safety became an important field of academic research and took increasing transport undertaking concerns. Improving the safety of people and road facilities is an essential key element to ensuring good operation of the road transport. Statistically, nearly 44% of LC users have a negative perception of the environment, which consequently increases the risk of accidents. For example, when an accident occurs, the transport operator waits for a road user noticing the accident at the LC premises to warn the traffic centre that something bad is happening at the LC.Then, the operator at the traffic centre calls all the approaching trains to tell them to stop immediately without any additional information. This is a "blind" way of managing LC incidents. According to Griffon, human errors cause 99% of accidents at the LCs, 93% of which are caused by road users. For this purpose, road and railway safety professionals from several countries have been focused on providing an LC that is as safe as possible. Actions are planned to exchange information and provide experiments for improving the management of LC safety and performance.

[1]. N. Noboru, "A study of sensing for sudden pedestrian movements", in Proc. ITS World Congress, October 2012, pp. 1–10.
[2]. S.Zhang , C.bauckhage, D.A.Klein and A.B.CREMERS, "Exploring Human Vision driven features for pedestrian detection", IEEE Trans.Circiuts,Syst. Video Technol., vol. 25, no. 10, pp.1709-1720,Oct.2015.
[3]. T.Gandhi and M.M.Trivedi, "pedestrian protection systems: issues, survey, and challenges," IEEE Trans.Intel.Transport.Syst.vol.8, no.3, pp. 413-430, Sept 2007.

 

  • Citation
  • Abstract
  • Refrences
  • View
Title
::
Position and Health Monitoring System Using Iot and Raspberry Pi
Country
::
India
Authors
::
K.Thendralarasi || J.Sathviga || R.Anandan
Page
::
15-19

Health Monitoring Is Playing An Important Role In Soldier's Life.More And More Users Or Soldiers Have Used Medical Iot Sensors Such As The Blood Pressure Sensors And Heartbeat Sensors.They Wear These Sensors, And These Sensors Will Monitor Their Health Data Every Time.The Collected Information Is Monitored In Iot.In The Emergency Case The Soldiers Can Press The Emergency Button For Help.If The Soldiers Were Fired The Help Command Is Given From The Iot Server To The Nearersoldier.Theiot Medical Sensors Will Send The Sensor Information Every Time And So The Sensor's Data Will Arrive At Tb-Class Or Pb-Class.The Traditional Storage Mechanismcan't Satisfy The Requirements.So We Use The Cloud Technologies In Proposed System.

 

Keywords -..............

[1] Forgy, C.L. Rete: A Fast Algorithm For The Many Pattern/Manyobject Pattern Match Problem [J]. Artificial
Intelligence.19(1982).Pp: 17-37.
[2] D. P. Miranker. Treat: A Better Match Algorithm For Aiproduction Systems[C]. In Proceedings Of Aaai 87 Conferenceon Artificial Intelligence, Pages 42-47, August 1987.
[3] J.Blumenthal Et Al.,"Weightedcentriod Localization In Zigbee-Based Sensor Networks".In Ieee International Symposium On
Intelligent Signal Processing.Pp.1-6 Oct 2007
[4] W.H.Kuo Et Al.,"An Intelligent Positioning Approach:Rssi-Based Indoor And Outdoor Localization Scheme In Zigbee Networks." In International Conference On Machine Learning Cybernetics,Qingdao,Pp.2754-2759,July2010

 

  • Citation
  • Abstract
  • Refrences
  • View
Title
::
Effective Inter-Operability between Ipv6 Networks through Tunneling and Dual Stack Mechanism
Country
::
India
Authors
::
S.Geetha || B.Shivaranjani || D.Sowbarnika || Mrs.G.Latha
Page
::
20-24

This paper presents the performance analysis on IPv6 data networks and based on the migration mechanism from IPv4 to IPv6. IPv4 network has limitation in terms quality parameter address space, latency and throughput and these parameters is affecting the overall performance of application. In this project, IPv6 network with migration techniques are proposed to overcome these limitations and to improve the system performance. The entire project will be implemented through simulation tools GNS-3, VPCS 2.0 and Wire shark and these tools has excellent features in designing advanced concepts with complex networks and quality analysis. As a solution, Tunneling and Dual stack concept is proposed to transmit IPv6 packet through IPv4 network that achieves fully convergence in IPv6 network. QoS analysis will be made in terms of latency and throughput parameter. 


Key words: - IPv4/IPv6 transition, tunneling, dual stack

[1]. Pyung Soo Kim, "Analysis and Comparison of Tunneling based IPv6 Transition Mechanisms", International Journal of Applied Engineering Research, vol.12, no.6, 2017.
[2]. SheetalBorse et al and Sheryl Radley et al, "A detail Comparative Review on IPv4/IPv6 Dual Stack Coexistence Technique",
International Journal of Innovative Research in Computer and Communication Engineering, vol.80, June 2016.
[3]. Farouk Abdul Jalin, Nor Effendy Othman, "A Review of Mobile IP Protocol for the implementation on Dual Stack Mobility
Management", Journal of Theoretical and Applied Information Technology, vol.87, no.3, 31st May 2016.
[4]. FebbyNurFatch et al, M. Mehran Arshad Khan et al, "Enhancing Data Dissemination in Dual-Stack Enterprise Hybrid Networks through Link State Routing Protocols", International Journal of Innovative Research in Computer and Communication Engineering, vol.4, Issue 6, June 2016.

 

  • Citation
  • Abstract
  • Refrences
  • View
Title
::
Utilization Of Zigbee Module In Rssi Localizationapplication Inside Prison
Country
::
India
Authors
::
Gokula Brindha.B || Arul Jothi.S || Prof. Saranya.S
Page
::
25-31

Existing researches on location tracking focus either entirely on indoor or entirely on outdoor by using different devices and techniques. Several solutions have been proposed to adopt a single location sensing technology that fits in both situations. This paper aims to track a user position in both indoor and outdoor environments by using a single wireless device with minimal tracking error. RSSI (Received Signal Strength Indication) technique together with enhancement algorithms is proposed to cater this solution. The proposed RSSI-based tracking technique is divided into two main phases, namely the calibration of RSSI coefficients (deterministic phase) and the distance along with position estimation................

 

Keywords -Global Robot localisation,Kalman filtering radio frequency identification (RFID) Technology.

[1] R. Tesoriero, J. A. Gallud, M. D. Lozano, and V. M. R. Penichet, "Tracking autonomous entities using RFID technology," IEEE
Trans. Consum.Electron., vol. 55, no. 2, pp. 650–655, May 2009.
[2] M. Boccadoro, F. Martinelli, and S. Pagnottelli, "Constrained and QuantizedKalman filtering for an RFID robot localization
problem," Auto. Robots, vol. 29, nos. 3–4, pp. 235–251, 2010.
[3] B.-S. Choi, J.-W.Lee, J.-J.Lee, and K.-T. Park, "A hierarchical algorithm for indoor mobile robot localization using RFID sensor fusion,"
[4] IEEE Trans. Ind. Electron., vol. 58, no. 6, pp. 2226–2235, Jun. 2011.
[5] P. Yang, W. Wu, M. Moniri, and C. C. Chibelushi, "Efficient object localization using sparsely distributed passive RFID tags,"
IEEE Trans.

 

  • Citation
  • Abstract
  • Refrences
  • View
Title
::
An Penta -Modal Physiological Characteristics For Realistic Authentication Of An Individual
Country
::
India
Authors
::
S.Sangeetha || J.Priya
Page
::
32-36

Biometrics is also used to identify individuals in groups that are under surveillance. Biometric identifiers are distinctive, measurable characteristics used to label and specifically describe individuals. A trimodal biometric system combines two or more biometric data recognition results to increase the performance of authentication systems that prevents unauthorized users from authentication and reduces False acceptance rate. The main aim of this paper is to provide multilevelauthentication in biometric systems. Tri-modal biometric is the usage of multiple biometric indicators by personal identification systems for identifying the individuals. Tri-modal authentication provides more level of authentication than uni-modal biometrics which uses only one biometric data such as fingerprint or face or palm print or iris. In this paper, we are using face, finger vein and iris of a person for the automatic identification of an individual by combining face ,finger vein and iris of a person at the matching-score level. A technique called Minutiae matching and Edge detection is used for this purpose.

 

Keywords-authentication, different methods, multiple biometrics, secured, un authentication.

[1] Mohamad Abdolahi, Majid Mohamadi, Mehdi Jafari, "Multimodal Biometric system Fusion Using Fingerprint and Iris with Fuzzy Logic", International Journal of Soft Computing and Engineering (IJSCE) ISSN: 2231-2307, Volume-2, Issue-6, January 2013
[2] M. A. Medina-Pérez, M. García-Borroto, A. E. Gutierrez-Rodríguez, and L. Altamirano-Robles, "Improving Fingerprint
Verification UsingMinutiae Triplets," Sensors, vol. 12, pp. 3418–3437, 2012.
[3] Ghazvini, M.; Sufikarimi, H.; Mohammadi, K. Fingerprint MatchingUsing Genetic Algorithm andTriangle escriptors. In
Proceedings ofthe 19th Iranian Conference on Electrical Engineering,Tehran, Iran,17–19 May 2011; pp. 1–6.
[4] Hoyle, K. Minutiae Triplet-Based Features with Extended RidgeInformation for Determining Sufficiency in Fingerprints.
MasterThesis, Virginia Polytechnic Institute and State University, BurrussHall Blacksburg, VA, USA, 2011

 

  • Citation
  • Abstract
  • Refrences
  • View
Title
::
A Iot-Based Farm Management System In Modern Cities Using Image Processing
Country
::
India
Authors
::
R.Divya || A.Hemalatha || M.Priyadarshini M.E.
Page
::
37-39

The recent technological advances have paved the way for developing and offering advanced services for the stakeholders in the agricultural sector. A paradigm shift is underway from monolithic tools to internet based systems that will enable more effective collaboration between stakeholders. This new paradigm includes the technological support of application developers to create specialized services that will seamlessly interoperate, thus creating a sophisticated and customisable working environment for the users. Here in this project, the system is like smart agriculture where it detects insect damage on cultivated crops through monitoring and updates the information through Ethernet. This system makes automatic irrigation possible, so in the end it reduces the manpower involved.

 

Keywords - automatic irrigation, insect damage, smart agriculture.

[1] Duan Yan-e, "Design of Intelligent Agriculture Management Information System Based on IoT", Intelligent Computation
Technologyand Automation (ICICTA) 2011 International Conference, vol. 1, pp. 1045-1049, March 2011.
[2] Meonghun Lee, Sunchon Nat, Jeonghwan Hwang, "Agricultural Production System Based on IoT", Computational Science
andEngineering (CSE) 2013 IEEE 16th International Conference, pp. 833-836, Dec 2013
[3] Balaji Bhanu, Raghava Rao, J.V.N. Ramesh, Mohammed Ali Hussain, "Agriculture Field Monitoring and Analysis using
WirelessSensor Networks for improving Crop Production", Eleventh International Conference on Wireless and Optical
CommunicationsNetworks (WOCN), 2014.
[4] Kerry Taylor et al., "Farming the web of things", Intelligent Systems, vol. 28, no. 6, pp. 12-19, 2013.

 

  • Citation
  • Abstract
  • Refrences
  • View
Title
::
Lightweight Mash up Middleware for Coal Mine Safety Monitoring and Control Automation
Country
::
India
Authors
::
Gayathri.V || Krishnaveni.S || Nithya B || Prof. Saranya.S
Page
::
40-44

The Mine Safety Monitoring System Plays A Major Concern In Almost All The Countries As It Requires Large Amount Of Explosive Gases And Chemicals For Its Operation. The Life Of Miners In Underground Environment Is Of Major Concern In Considering The Safety Measures In Mine Sectors. In Coal Mines, Whenever Explosions Or Any Gas Leakage Occur, The Mine Workers Are Not Aware Of The Environmental Condition Inside Coal Mine Because The Wired Mine Monitoring Systems May Be Destroyed Or Damaged. This Makes The Life Of Workers Very Risky. It Also Takes Some Time For The Rescue Workers To Reach The Spot. This Project Addresses An Economical And Continuous Monitoring System Of Underground Mine Workers' Protection And Security. Gas Sensors Are Used For Monitoring Underground Parameters Using Wsn (Wireless Sensor Network). A Microcontroller Based System Is Used For Collecting And Storing Data And Making Decision Accordingly, Based On Which The Mine Worker Is Informed Through The Alert System. The Communication System Is Reliable Based On Zigbee Ieee 802.15.4 Standard. This Is Used For Wireless Transmission Between The Hardware Circuit Fitted With The Mine Station And The Ground Control Computer System Through Some Routers.

[1] Bin, G., Huizong, L. (2011), "The Research On Zigbee-Based Mine Safety Monitoring System".Bo, C., Xiuqan, Q., Budan, W.,
Xiaokun, W. Et Al. (2012), "Restful Web Service MashupBased Coal Mine Safety Monitoring And Control Automation With
Wireless Sensor Network".Boddu, R., Balanagu, P., Babu, N.S. (2012), "Zigbee Based Mine Safety Monitoring System
[2] With Gsm".
[3] Borkar, C., "Development Of Wireless Sensor Network System For Indoor Air Quality Monitoring"Dange, K.M., Patil, R.T.
(2013), "Design Of Monitoring System For Coal Mine Safety BasedOn Msp430".
[4] Dubaniewicz, T.H., Chilton, T.H., Doboroski (1993), "Fiber Optic For Atmospheric MineMonitoring. Ieee Transactions On
Industry Applications".Fu, H., Wang, T., Yuang, C. (2009), "Intelligent Fuzzy Sensing System In Coal Mine SafetyMonitoring".

 

  • Citation
  • Abstract
  • Refrences
  • View
Title
::
Area Efficient Hierarchical Signal Detector Approach For MIMO OFDM
Country
::
India
Authors
::
b.Divya || t.Keerthana || mohan Priya || Mr.M.Jaya Mohan
Page
::
45-49

Multiple-Input Multiple-Output (Mimo) Based Index Modulation Has The Advantage Of High Data Rate And Low Complexity Transmission Which Drawn Great Attention Recently. And On The Other Side Due To Invention Of Digital Video Broadcasting 16-Qam And 64-Qam Schemes Are Most Widely Used In Recent Wireless Systems. In This Paper We Introduce A Novel Low-Complexity Signal Detector Enabled Multiple-Input Multiple-Output (Mimo) Detector Tailored With Im Systems, Suitable For Efficient Low Complexity System With Tolerable Error Rate. The Actual Im Methods Has No Diversity Gain Which Causes A Significant Reduction In The System Performance. In This Paper To Eliminate The Bad Effects Of The Channel Assignment Of The Im, Novel Ml Based Mimo Systems With Index Modulation Technique (Ml-Mimo-Im) Is Proposed. Here The Efficient Hybrid Ml Sub Detector System Is Used To Achieve Superior Performance Compared To The Conventional Mimo Detectors. The Performance Of The Proposed Design Is Close To The Existing Mimo Scheme, While Resulting In A Significantly Lower Complexity. The Efficiency Of Mimo Over High Order Constellations Are Verified Through Matlab Ber Simulation And Complexity Reduction Is Also Proved To Be An Efficient One.

 

Keywords - Mimo, Spatial Modulation, Index Modulation, Bit Error Rate , Ml Detector Etc.

[1] Chao-Wang Huang, Pang-An Ting, And Chia-Chi Huang "A Novel Message Passing Based MIMO-OFDM Data Detector With A Progressive Parallel ICI Canceller." IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 10, NO. 4, APRIL
2011.
[2] V. Tarokh, H. Jafarkhani, And A. R. Calderbank, "Space-Time Block Codes From Orthogonal Designs," IEEE Trans. Inf. Theory, Vol. 45, Pp. 1456-1467, July 1999.
[3] H. Jafarkhani, "A Quasi-Orthogonal Space-Time Block Code," IEEE Trans. Commun., Vol 49, No. 1, Pp. 1-4, Jan. 2001.
[4] V. Tarokh, A. Naguib, N. Seshadri, And A. R. Calderbank, "Combined Array Processing And Space-Time Coding," IEEE Trans. Inf. Theory, Vol. 45. Pp. 1121-1128, May 1999.
[5] A. F. Naguib, N. Seshadri, And A. R. Calderbank, "Applications Of Space-Time Block Codes And Interference Suppression For High Capacity And High Data Rate Wireless Systems," In Proc. 32nd Asilomar Conf. Signals, Syst. Comput., Pp. 1803-1810, 1998

 

  • Citation
  • Abstract
  • Refrences
  • View
Title
::
Femtosecond Soliton Interaction in Tapered Non-Kerr Media
Country
::
India
Authors
::
S.Nandhini || T.K.Shanthi
Page
::
50-55

Under Investigation In This Paper Is An Inhomogeneous Tapered Nonlinear Schrödinger Equation By Including Cubic Quintic Term Which Is Used To Describe About The Femtosecond Pulse Propagation In Tapered Non-Kerr Media. By Increasing The Input Intensity Of Pulse Further The Kerr Media Tends To Non- Kerr Media. Here We Constructed Lax Pair Via Akns Technique And After Satisfying Lax Pair The Obtained Equation Is Further Analyzed By Using Darboux Transformation To Obtain Two Soliton Solution. And Here As The Pulse Is Propagating In A Tapered Fiber Pulse Compression Can Be Achieved. Henceforth The Results Obtained In This Paper Will Have A Qualitative Application For Pulse Compression In Dispersion–Managed Fiber.

 

Keywords - Cubic Quintic, Nls, Akns Technique, Non-Kerr Media.

[1] G.P. Agrawal, Nonlinear Fiber Optics, New York, Academic Press,2007;
[2] A. Hasegawa And F. Tappert, Appl.Phys.Lett.23,(1973).
[3] L. F. Mollenauer, R. H. Stolen, And J. P. Gordon, Phys. Rev. Lett.45, 1095 (1980).
[4] R. Hao, L. Li, Z. Li, G.S. Zhou, Phys. Rev. E 70, 066603(2004)
[5] J.F. Zhang, Q. Yang, C.Q. Dai, Opt. Commun. 248, 257(2005)