IJARCCE adheres to the suggestive parameters outlined by the University Grants Commission (UGC) for peer-reviewed journals, upholding high standards of research quality, ethical publishing, and academic excellence.
RODOLFO ROMERO HERRERA, LESLIE VICTORIA RODRÍGUEZ QUIÑONES Escuela Superior de Computo del Instituto Politécnico Nacional, Av. Juan De Dios Batiz s/n Col Industrial Vallejo, 07738 México D.F
Professor of Computer Science & Informatics Dept. of Information Technology
Institute of Graduate Studies & Research, Alexandria University, Alexandria, Egypt
Researcher in Dept. of Information Technology
Institute of Graduate Studies & Research, Alexandria University, Alexandria, Egypt
Professor of Computer Science & Informatics, Dept. of Information Technology,
Institute of Graduate Studies & Research, Alexandria University, Alexandria, Egypt
Researcher in Dept. of Computer Science, Faculty of Science, Alexandria University, Alexandria , Egypt
Research Scholar, Dept. of CSE, CMJ University, Shillong, Meghalaya, India
Associate Professor, Dept. of CSE, VelMultitech Dr. RR Dr.SR Engineering College, Chennai, India
Research Scholar, Dept. of CSE, CMJ University, Shillong, Meghalaya, India
Research Scholar, Dept. of CSE, CMJ University, Shillong, Meghalaya, India
Department of Electronics Sciences, University of Delhi, New Delhi – 110005, India
Department of Electronic & Communication, MANIT, Bhopal – 462051, India
Lecturer, Department of Electronics., SDMP, Nagpur, Maharashtra, India
M-Tech (4th Semester), Department of Communication Engg., YCCE Nagpur, Maharashtra, India
II Year M.Tech, Dept. of ECE, Sri Mittapalli College of Engineering, Guntur, Andhra Pradesh, India
Assistant Professor, Dept. of ECE ,Sri Mittapalli College of Engineering, Guntur, Andhra Pradesh, india
AMMAR YASSIR, DR.PRIYANKA ROY, JANAKI SIVAKUMAR Department of Information Technology, CMJ University, Shillong, India Professor, Gateway Education Pvt Ltd, Chandigarh, India Department of Computer Science, PRIST University, Tanjore, India
M.Tech-SE, DRK Institute of Science and Technology, JNTUH, Hyderabad, India
ASSOCIATE PROFFESOR, DRK Institute of Science and Technology, JNTUH, Hyderabad, India
Vemana Chary. D, Padmanabham. P, Prabhakara Rao. B
Associate Professor, Department of ECE, Bharat Institute of Engineering & Technology ,Hyderabad, India
Professor& Director of Academics, Department of CSE, Bharat Institute of Engineering & Technology,Hyderabad, India
Professor , Department of ECE, University college of Engineering, JNTUK, Kakinada, India
Adrian Lim Hooi Jin, Arjuna bin Marzuki, Bee Ee Khoo
School of Electrical & Electronic Engineering, Universiti Sains Malaysia, Penang, Malaysia
|
Abstract
Reinforcement learning model for virtual pets
RODOLFO ROMERO HERRERA, LESLIE VICTORIA RODRÍGUEZ QUIÑONES Escuela Superior de Computo del Instituto Politécnico Nacional, Av. Juan De Dios Batiz s/n Col Industrial Vallejo, 07738 México D.F
Abstract: Virtual pets are developed with the ability to learn from their environment and interact with the user, which is used for Reinforcement Learning and interaction local or independent. Intelligent agents are used in a virtual environment and receive feedback; we simulate many daily activities of a dog which is essential for the interaction with the user. The use of learning in pets gives a real dimension artificial life and allows the system to evolve intelligently. They give a satisfactory learning in mathematical linguistics considering it as a process. The sequence is repeated at different intervals of time, therefore it is a recursive function, and finally obtained the generalization error, through the concept of distance.
Strategies of Efficient Backlighting System for Portable Two-Way Radio Design
Adrian Lim Hooi Jin, Arjuna bin Marzuki, Bee Ee Khoo
School of Electrical & Electronic Engineering, Universiti Sains Malaysia, Penang, Malaysia
Abstract: In the 2-way radios market, long battery life has becomes an essential & critical customer requirement for communications during critical public safety or rescue missions. Thus in tandem with this need, various researches have been conducted by industry players to reduce the current consumption of the design with minimum sacrifices on product performance. This paper attempts to describe various key strategies that can be adopted in the design of backlighting system for portable two ways radio design to reduce the overall current drain consumptions. Case study was carried out on the keypad and liquid crystal display (LCD) backlighting systems of the off-the-shelf portable two-way radio in the market and recommendations for optimizations were laid forward which includes careful selection of LED, light guide and power management topology to drive the light emitting diodes (LEDs) in an efficient manner and successfully reducing current drain consumptions by a remarkable 24 %.
Keywords: Backlights, battery life, current drain reduction, efficiency.
Simulation analysis of secure routing in Mobile Ad hoc networks
Shawkat K. Guirguis, Youssef A. Othman
Professor of Computer Science & Informatics Dept. of Information Technology
Institute of Graduate Studies & Research, Alexandria University, Alexandria, Egypt
Researcher in Dept. of Information Technology
Institute of Graduate Studies & Research, Alexandria University, Alexandria, Egypt
Abstract: Mobile ad-hoc networks (MANETs) is an appealing technology that has attracted lots of research efforts over past years. Although the principle of wireless, structure-less, dynamic networks is attractive, there are still some major flaws that prevent commercial expansion. Security is one of these main barriers; MANETs are known to be particularly vulnerable to security attack. In this paper we discuss the secure routing in MANETs and evaluate the performance and security of the some secure protocol of MANETs, ns-2 simulations are performed to evaluate the impact of Mobility of the different number of nodes also malicious threats and attacks in the simulation environments .
Evaluating the performance of secure routing protocols in Mobile Ad-hoc Networks
Shawkat K. Guirguis, Ommelhana S .Saaid
Professor of Computer Science & Informatics, Dept. of Information Technology,
Institute of Graduate Studies & Research, Alexandria University, Alexandria, Egypt
Researcher in Dept. of Computer Science, Faculty of Science, Alexandria University, Alexandria , Egypt
Abstract: Mobile ad hoc network (MANET) is a special type of mobile wireless network where a collection of mobile devices form a temporary network without any aid of an established infrastructure. During data transmission between these devices there may be malicious threats, attacks, and penetrations which alters the performance of the system and insecure transmission. Multiple routing protocols especially for these conditions have been developed during the last years, to find optimized routes that free from attacks from a source to some destination. This paper presents comparison based on simulation of three secure routing protocol of MANET.
Keywords: Mobile Ad hoc Networks, NS2, SEAD, SAODV, SZRP
Adaptive M-Shadow Model for handling Mobile Database Transaction Processing
Romani Farid Ibrahim
Department of Computer information systems, Faculty of Information Technology,
Al Hussein Bin Talal University, Jordan
Abstract: Recent advances in wireless communications and mobile devices such as laptops, mobile phones, PDAs, etc, and their cheap price and the emergence of many mobile applications have provided users with the ability to access data from anywhere. In this paper, our concern is the management of disconnection in mobile transaction that access temporal database and/or spatial database. M-Shadow (Mobile-Shadow) handles a compound (or a group) transaction that consists of groups of subtransactions which may be independent or dependent. We adopted the M-Shadow to handle partially dependent subtransactions and to be implemented as one application handles the three cases together (independent and/or dependent and/or partially dependent), and taking in consideration the location dependency. M-Shadow uses of a notation of actionability, which differentiates the actions to be taken during the transaction’s validation phase according to the types of affected attributes. We extended the actionability data types to include Change-Passing and Location-time attributes. The M-Shadow technique increase the success probability of transactions processed under optimistic concurrency techniques.
Research Scholar, Dept. of CSE, CMJ University, Shillong, Meghalaya, India
Associate Professor, Dept. of CSE, VelMultitech Dr. RR Dr.SR Engineering College, Chennai, India
Research Scholar, Dept. of CSE, CMJ University, Shillong, Meghalaya, India
Research Scholar, Dept. of CSE, CMJ University, Shillong, Meghalaya, India
Abstract: Privacy preserving data mining is an important topic on which lot of researchers going on last years. There are many approaches to hide association rule. In this paper Efficient Heuristic approach method is proposed which is more effective to hide association rule. The objective of this algorithm is to extract relevant knowledge from large amount of data, while protecting at the time sensitive information. The proposed method focused on hiding set of frequent items containing highly sensitive knowledge that only remove information from transactional database with no hiding failure.
Keywords: Minimum Confidence, Minimum Support, Itemset, Association rules.
Zigzag Keeper: A New Approach For Low Power Cmos Circuit
Kaushal Kumar Nigam, Ashok Tiwari
Department of Electronics Sciences, University of Delhi, New Delhi – 110005, India
Department of Electronic & Communication, MANIT, Bhopal – 462051, India
Abstract: In CMOS circuits, the reduction of the threshold voltage due to voltage scaling leads to increase in sub threshold leakage current and hence, static power dissipation. For the most recent CMOS feature sizes (e.g., 45nm and 65nm), leakage power dissipation has become an overriding concern for VLSI circuit designers. ITRS reports that leakage power dissipation may come to dominate total power consumption [1]. In the nanometer technology regime, power dissipation and process parameter variations have emerged as major design considerations. These problems continue to grow with leakage power becoming a dominant form of power consumption. Leakage power dissipation is projected to grow exponentially in the next decade according to the International Technology Roadmap for Semiconductors (ITRS).This directly affects portable battery operated devices such as cellular phones and PDAs since they have long idle times. Several techniques at circuit level and process level are used to efficiently minimize leakage current which lead to minimize the power loss and prolong the battery life in idle mode. A novel approach, named “Zigzag keeper,” was proposed at circuit level for the reduction of power dissipation. Zigzag keeper incorporate the traditional zigzag approach with keeper which use the sleep transistor plus two additional transistors driven by already calculated output which retain the state of the circuit during the sleep mode while maintaining the state or state retention.
A Highly Secure Skin Tone Based Optimal Parity Assignment Steganographic Scheme Using Double Density Discrete Wavelet Transform
ARUNA MITTAL Lecturer, Department of Electronics., SDMP, Nagpur, Maharashtra, India
Abstract: Steganography is the art of hiding the existence of data in another transmission medium i.e. image, audio, video files to achieve secret communication. It does not replace cryptography but rather boosts the security using its obscurity features. The proposed method uses both Cryptography and Steganography to enhance the security of the message. The secret message is first encrypted using RSA algorithm and then randomized using OAEP[1]. This encoded message is then embedded in the bitmap cover image using frequency domain approach. For embedding the encrypted message, initially skin tone regions of the cover image are detected using HSV (Hue, Saturation, Value) model. Thereafter, a region from skin detected area is selected, which is known as the cropped region. In this cropped region secret message is embedded using DD-DWT (Double Density Discrete Wavelet Transform). DD-DWT overcomes the intertwined shortcomings of DWT (like poor directional selectivity, Shift invariance, oscillations and aliasing)[2]. Hence the image obtained after embedding secret message (i.e. Stego image) is far more secure and has an acceptable range of PSNR. The proposed method is much better than the previous works both in terms of PSNR and robustness against various noises (like Poisson, Gaussian, salt and pepper, rotation, translation etc.)
Selection of pulse for ultra wide band communication (UWB) system
Ashish K. Thakre, Amol I. Dhenge
Lecturer, Department of Electronics., SDMP, Nagpur, Maharashtra, India
M-Tech (4th Semester), Department of Communication Engg., YCCE Nagpur, Maharashtra, India
Abstract: UWB (Ultra Wide Band) technology is a reliable transmission scheme for wireless communication with high data rates. UWB is defined as signals with fractional band width more than 20% of its central frequency or as signals with bandwidth more than 500MHZ. UWB can be characterized with ultra-short duration pulses called monopulses which has excellent immunity in interference from sensitivity or multi path effects or fading problems. Pulse shaping and baseband modulation schemes are two of the main determinant factors for its performance evaluation. The objective of the paper is to examine different types of pulse shaping and modulation schemes for UWB performance evaluation. By considering three different types of pulses and modulation techniques the BER (bit error rate) performance of the modulation techniques are evaluated in the presence of the AWGN (additive white Gaussian noise).Depending upon the BER, we decide the which modulation and pulse are considered for UWB system.
Comparison of Various Fir Lowpass Filter Design Techniques with PSO Algorithm
Vijay. P, M. Venkata Sudhakar
II Year M.Tech, Dept. of ECE, Sri Mittapalli College of Engineering, Guntur, Andhra Pradesh, India
Assistant Professor, Dept. of ECE ,Sri Mittapalli College of Engineering, Guntur, Andhra Pradesh, india
Abstract: This paper presents an optimization technique for the design of optimal digital FIR low pass filter. The design of digital FIR Filters possible by solving a system of linear equations .In this paper we are using PSO (particle Swarm Optimization).PSO method is used to determine the frequency response of Digital FIR filters, consequently the optimal filter coefficients are obtained with fast convergence speed. PSO technique is purely random algorithm. PSO technique provides optimal filter coefficients such that error function is minimized when compared with the traditional FIR filter design techniques such as windowing techniques. The convergence speed of PSO is faster than the traditional FIR filter design techniques. Particle Swarm Optimization technique which has been applied in many areas such as function optimization, fuzzy system method and other areas.
Department Of CSE, MIT College of Engg, Aurangabad, Dr.B.A.M.University, Aurangabad (M.S), India
Abstract: This paper contains the results of implementation of Data Leakage Detection Model. Currently watermarking technology is being used for the data protection. But this technology doesn’t provide the complete security against date leakage. This paper includes the difference between the watermarking & data leakage detection model’s technology. This paper leads for the new technique of research for secured data transmission & detection, if it gets leaked.
A New Approach in Steganography using different Algorithms and Applying Randomization Concept
U. Rizwan and H. Faheem Ahmed
Department of Mathematics, Islamiah College, Vaniyambadi, India
Department of Computer Science, Islamiah College, Vaniyambadi, India
Abstract: In this paper, we have given an overview of the image steganography, its uses and techniques. We have proposed some new techniques of embedding a text message in an image in every odd, even, prime number memory location of image pixel values. We have also compared the actual and embedded images with histograms and computed the Mean Square Error(MSE) and Peak to Signal Noise Ratio (PSNR). We also compute the Structural SIMilarity (SSIM) index of all our images and make a comparative study. SSIM is a method for measuring the similarity between two images. It is an improved version of the universal image quality index proposed before. SSIM gives a much better indication of image quality.
Abstract: Clustering the case of non-axis-aligned subspaces and detection of outliers is a major challenge due to the curse of dimensionality. To solve this problem, the proposed implementation is extension to traditional clustering and finds subsets of the dimensions of a data space .In this project, a probability model is proposed to describe in hidden views and the detection of possible selection of relevant views. A projective clustering is proposed for Outlier Detection in High Dimensional Dataset that discovers the detection of possible outliers and non-axis –aligned subspaces in a data set and to build a robust initial condition for the clustering algorithm. Improving the parameters in the connection between L∞ corsets and sensitivity that is made in Lemma and improve clustering in the case of non-axis-aligned subspaces and detection of outliers in datasets. The suitability of the proposal demonstrated is done with synthetic data set and some widely used real-world data set.
Keywords: Clustering, high dimensions, projective clustering, probability model.
Performance Analysis of Secure Routing Protocols in MANET
K. Thamizhmaran, R. Santosh Kumar Mahto, V. Sanjesh Kumar Tripathi
Asst Professor / ECE, Dept of Electrical Engg, Annamalai University, Annamalai nagar, Tamilnadu, India
ECE (Final Yr) / Dept of Electrical Engg, Annamalai University, Annamalai nagar, Tamilnadu, India
Abstract: Mobile Ad-Hoc Networks (MANET) is the infrastructure less network that can be constructed without any base station, re-transmission switches and routers. Mobile adhoc network nodes share the data and service. In MANET, a node can get compromised during the route discovery process. Attackers from inside or outside can easily exploit the network. Several secure routing protocols are proposed for MANETs. Security in MANETs is critical when deployed in real-world scenarios, such as battlefield, and event coverage, etc. In this paper we evaluate the performance comparison of three s routing protocols such as SEAD, AODV and DSR. Across the models with respect to considered metrics for comparison, SEAD outperformed others followed by AODV and DSR.
High Speed Double Precision Floating Point Multiplier
Addanki Purna Ramesh, Rajesh Pattimi
Department of ECE, Sri Vasavi Engineering College, Pedatadepalli, Tadepalligudem, India
Abstract: In this paper we describe an implementation of high speed IEEE 754 double precision floating point multiplier targeted for Xilinx Virtex-6 FPGA. Verilog is used to implement the design. The multiplier implement area optimized design, high speed operation with latency of seven clock cycles, it handles the overflow, underflow cases, and the multiplier support truncation rounding mode was implemented. The multiplier was verified against Xilinx floating point multiplier core.
Keywords: binary floating point, multiplication, FPGA.
Data Management by Privacy Preserving In the Anonymous Database Using Suppression and Generalization protocols
J Yashwanth kumar, G Kalpana
M.Tech-SE, DRK Institute of Science and Technology, JNTUH, Hyderabad, India
ASSOCIATE PROFFESOR, DRK Institute of Science and Technology, JNTUH, Hyderabad, India
Abstract: The main aim of our project is to give confidentiality to user details in a database and we are going to show this by using a medical process and that medical DB. When a patient newly comes to a medical his information must be collected so here also we are going to do the same thing. The medical database admin (MDA) will store all the fresh information about that patient in the anonymous database. And give one user name id password to that patient to access his/her page created by that medical. When user wants to open his/her page, he/she can use that user id and password that page. In that page all doctor information will be available who all are working in that medical. By that list patient can give request to the preference doctor. then request will go to the particular doctor page. If doctor approve the particular patient appointment request. Then the patient add as his/her OWN PATIENT list and can start the treatment. Dr can store all the patient information (Treatment, medicine, status) in the anonymous database and when treatment would be finished Dr can use the complete action on his/her page then only all the information regarding that patient will to that anonymous database . Then after completion Dr will send the Patient id to the MDA. Here MDA will send approval request to the patient to send his/her details to the researchers and if patient will give the permission then only MDA will send the information to the researchers. After getting the details researcher admin will allocate maximum sub researcher to researching about that disease and treatment now the maximum sub researchers only can access the database for research and save all the researching information in anonymous database but in two ways one for user and another one for doctor. If user search about the disease in web. The user can get only limited information from the anonymous database. And also doctor also can get the particular new treatment and medical information from the anonymous database.
Keywords: Privacy, anonymity, data management, secure computation, confidentiality, cryptography.
Design of Circular patch antenna using L-slit for WIMAX, WLAN & X-band applications
Barun Mazumdar
Dept of ECE, Aryabhatta Institute of Engineering and Management, Durgapur, India
Abstract: A single feed compact Circular microstrip antenna for dual band applications is presented in this paper. L slit is introduced at the right edge of the patch to reduce the resonant frequency. For the proposed antenna two resonant frequencies are obtained at 5.769 GHz and 9.74 GHz with bandwidth of 18.57 MHz, return loss –15.35 dB and bandwidth of .74 GHz, return loss - 25.47 dB respectively. The antenna size has been reduced by 75.3 % when compared to a conventional microstrip patch. Mainly it is developed to operate in the WiMAX, WLAN & X-band application.
Bioinformatics: A revolutionary way of using Computer technology for evidence based medicine
Onkar S Kemkar and Dr P B Dahikar
PCD ICSR, VMV College Campus, Wardhaman Nagar, Nagpur – 440008, India
Kamla Nehru Mahavidyalaya, Sakkardara Square, Nagpur – 440009, India
Abstract: A flood of data means that many of the challenges in biology are now challenges in computing. Bioinformatics, the application of computational techniques to analyze the information associated with bimolecular on a large-scale, has now firmly established itself as a discipline in molecular biology, and encompasses a wide range of subject areas from structural biology, genomics to gene expression studies. In this review we provide an introduction and overview of the current state of the field. We discuss the main principles that underpin bioinformatics analyses, look at the types of biological information and databases that are commonly used, and finally examine some of the studies that are being conducted, particularly with reference to transcription regulatory systems.
Orthogonal Array Approach for Test Case Optimization
Shubhra Banerji
Project Manager, Software Testing Research & Development Unit, IBM India Pvt. Ltd., Bangalore, India
Abstract: In Software Testing, we try to cover all test scenarios and test cases to test an application/product to achieve 100% test coverage. However, most of the times we do not have the leisure of time to test all the test cases [1]. In such cases, we have to balance between the specified time and quality so that we achieve maximum test coverage. This becomes a very big challenge for the Software Test Managers.
According to Gupta [6], managers adopt multiple strategies to optimize the testing effort and achieve the right balance between Cost, Schedule and Quality. Striking a right balance decides the success or failure of any software solution. In this paper, we have proposed a technique called Orthogonal Array Approach for reducing the number of test cases that needs to be tested for any given software and hence improve the efficiency of testing. With this technique, reduced numbers of test cases are generated automatically. Fewer test cases would reduce time consumption of the testing as a whole and hence the cost of testing will also reduce. The details of the technique are described along with two case studies for illustration. The advantages of the method are clearly brought out with the help of analysis graphs.
Keywords: Software Testing, Test Case Generation, Test Case Reduction, Orthogonal Array Approach.
Energy Efficient Routing Protocol for Mobile Ad hoc Networks using Trust Based Security
Vemana Chary. D, Padmanabham. P, Prabhakara Rao. B
Associate Professor, Department of ECE, Bharat Institute of Engineering & Technology ,Hyderabad, India
Professor& Director of Academics, Department of CSE, Bharat Institute of Engineering & Technology,Hyderabad, India
Professor , Department of ECE, University college of Engineering, JNTUK, Kakinada, India
Abstract: MANET is a well known network in which wireless nodes are connected. This is also known as infrastructure less network. MANET might have colluding nodes in the network environment. The colluding nodes cause internal attacks in the wireless network. These results in security problems in the network and finally the MANET performance will go down or even the network breaks down. To overcome this problem, this paper presents mechanisms to detect colluding nodes and defend them. The proposed algorithm works on route detection trust management for the purpose of detecting colluding nodes and defending them from causing internal attacks. The local forwarding nodes discover routes and also involved in calculating trust. In order to calculate trust value of each nodes the trust of its one – hop neighbors is calculated. In cluster heads the information such as trust and route discovery is stored and maintained. The simulation results revealed that the proposed algorithm is effective in secure routing in MANETs.
Geo-Spatial Data Generation and Terrestrial Scanning for 3D Reconstruction
Dr.M.Prithviraj, Vijay.U.T, Ajay Kumar.G.C
Karnataka State Council for Science and Technology, Indian Institute of Science, Bangalore, India
Abstract: Digital reconstruction of heritage sites is in vogue in most of the developed countries especially in Europe which offers several such heritage sites to promote historical research, virtual tourism, restoration, reconstruction etc. Keeping this in view a Programme on Indian Digital Heritage (IDH) has been evolved by the Department of Science and Technology to capture the rich heritage of India on a digital platform using modern advanced technologies for reconstruction and recreating through ages and also to use the information for holistic analysis. The project ‘Digital Geospatial data generation and Terrestrial Scanning for 3D Reconstruction of Heritage site at Hampi under the ‘Programme of IDH on Hampi’ aims to develop digital geo spatial database including digital terrain of the entire site, 3D Geodetic framework of the important heritage monuments through high resolution terrestrial scanning and Global Position system(GPS) location of heritage monuments. In this paper the project team presents the results of the Digital Elevation Model created using the data collected
Keywords: Indian Digital Heritage, Digital Elevation model, Terrestrial Laser scanning, Global Positioning System
Study on Transmission of an RF Signal through Phantom Muscle Tissue
JOEL FLORES, JORGE BECERRA, PATRICIA LORENA RAMÍREZ ICE, ESIME-ZACATENCO/IPN, México City, Mexico
Abstract: The development of phantom materials provide an approximate simulation of the electromagnetic properties on human body over a determined frequency and temperature range. This material is important for understanding the interaction between implant medical devices and the electromagnetic fields. That is why, its importance in substitution of biological means on the development of transcutaneous energy links for implanted devices. This paper describes the effect of the biological environment, simulated by a substitute of tissue and silicon material on the transmission of the RF signal from a magnetic coupling between two coil system transcutaneous energy.
Power Distribution in Portable Two-Way Radio Design Efficiency Improvement
Adrian Lim Hooi Jin, Arjuna bin Marzuki, Bee Ee Khoo
School of Electrical & Electronic Engineering, Universiti Sains Malaysia, Penang, Malaysia
Abstract: In the 2-way radios market, long battery life has becomes an essential & critical customer requirement for communications during critical public safety or rescue missions. Thus in tandem with this need, various researches have been conducted by industry players to reduce the current consumption of the design with minimum sacrifices on product performance. This paper attempts to describe various key strategies that can be adopted in the design of portable two ways radio design in optimizing the efficiency of the power distribution network in the radio and design guidelines on selection and implementation of switching regulator in radio to reduce the overall current drain consumption.
Keywords: Battery life, current drain reduction, efficiency, switching regulator