2015 International Conference and Workshop on Computing and Communication (IEMCON)最新文献

筛选
英文 中文
A novel adaptive algorithm for estimation of sparse parameters in non-Gaussian noise 一种新的自适应非高斯噪声稀疏参数估计算法
2015 International Conference and Workshop on Computing and Communication (IEMCON) Pub Date : 2015-10-01 DOI: 10.1109/IEMCON.2015.7344492
M. Hajiabadi, Behrooz Razeghi, Mahdi Mir
{"title":"A novel adaptive algorithm for estimation of sparse parameters in non-Gaussian noise","authors":"M. Hajiabadi, Behrooz Razeghi, Mahdi Mir","doi":"10.1109/IEMCON.2015.7344492","DOIUrl":"https://doi.org/10.1109/IEMCON.2015.7344492","url":null,"abstract":"The goal of this paper is to propose a novel diffusion adaptive algorithm for estimation of sparse system with non- Gaussian noise. The proposed adaptive algorithm uses zero-norm regularization for accelerating the speed of convergence in sparse conditions and it uses maximum correntropy criterion (MCC) to access lower steady-state error in the presence of non-Gaussian noise. In order to reach more reduction in both transient and steady-state error, a diffusion strategy of the proposed algorithm is also employed where each local adaptive filter solves its own optimization problem and then diffuses information to its neighbors. The superiority of the proposed algorithm for non- Gaussian noises and sparse conditions is shown via computer simulations.","PeriodicalId":111626,"journal":{"name":"2015 International Conference and Workshop on Computing and Communication (IEMCON)","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123457553","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
A review of trust based secure routing protocols in MANETs manet中基于信任的安全路由协议综述
2015 International Conference and Workshop on Computing and Communication (IEMCON) Pub Date : 2015-10-01 DOI: 10.1109/IEMCON.2015.7344490
Prachatos Mitra, Soham Mukherjee
{"title":"A review of trust based secure routing protocols in MANETs","authors":"Prachatos Mitra, Soham Mukherjee","doi":"10.1109/IEMCON.2015.7344490","DOIUrl":"https://doi.org/10.1109/IEMCON.2015.7344490","url":null,"abstract":"A mobile ad-hoc network or MANET is a wireless, self-configuring and infrastructure-less mobile network. Due to its dynamic nature, secure routing is an inherent issue in a MANET. Cryptographic and trust based methods can be used to prevent attacks from malicious nodes in MANET. Cryptographic methods are computationally intensive and hence usually unfeasible for a low infrastructure network such as a MANET. Trust based methods are generally more efficient in comparison and can be used for secure routing. Several trust based protocols have been proposed in literature. A `trust' value is defined, using various network parameters, which represents an opinion based on behavior of a certain node or a set of nodes. This trust value is used to compute secure routes in a MANET. In this paper, different trust based routing algorithms are discussed. The performance, strengths and possible issues with the protocols are also analyzed.","PeriodicalId":111626,"journal":{"name":"2015 International Conference and Workshop on Computing and Communication (IEMCON)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126447354","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Heuristic Intrusion Detection and Prevention System 启发式入侵检测与防御系统
2015 International Conference and Workshop on Computing and Communication (IEMCON) Pub Date : 2015-10-01 DOI: 10.1109/IEMCON.2015.7344479
I. Mukhopadhyay, K. Gupta, Diptarshi Sen, Piyali Gupta
{"title":"Heuristic Intrusion Detection and Prevention System","authors":"I. Mukhopadhyay, K. Gupta, Diptarshi Sen, Piyali Gupta","doi":"10.1109/IEMCON.2015.7344479","DOIUrl":"https://doi.org/10.1109/IEMCON.2015.7344479","url":null,"abstract":"The Heuristic Intrusion Detection and Prevention System (HIDPS) is a system that can intelligently scan for malicious behavior from a program either within the system, or trying to access the system. The aforementioned system contains no `Virus definitions' as such but works “Intelligently” using heuristics and online scanning techniques. The proposed system will be able to analyze the program and make decisions about its nature i.e. malicious or non-malicious. Depending upon the nature of the program access is granted or revoked. The system does not rely on time to time updates or any kind of updates at all, reason being the use of heuristics and online scanning techniques. It functions as a standalone script which can be a complete security suite in itself. Since every active process and network packet is monitored, the possibility of rootkits or Trojans remaining undetected is small.","PeriodicalId":111626,"journal":{"name":"2015 International Conference and Workshop on Computing and Communication (IEMCON)","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130210287","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Analytical performance of millimeter-wave OFDM systems in presence of power amplifier nonlinear distortions 功率放大器非线性失真存在下的毫米波OFDM系统性能分析
2015 International Conference and Workshop on Computing and Communication (IEMCON) Pub Date : 2015-10-01 DOI: 10.1109/IEMCON.2015.7344471
S. Manjunath, A. Behnad, Xianbin Wang, A. Dounavis
{"title":"Analytical performance of millimeter-wave OFDM systems in presence of power amplifier nonlinear distortions","authors":"S. Manjunath, A. Behnad, Xianbin Wang, A. Dounavis","doi":"10.1109/IEMCON.2015.7344471","DOIUrl":"https://doi.org/10.1109/IEMCON.2015.7344471","url":null,"abstract":"In this paper, the performance of a millimeter wave Orthogonal Frequency Division Multiplexing (OFDM) wireless communication system in presence of power amplifier nonlinear distortions is studied. An analytical expression for the symbol error probability has been derived to evaluate the performance of a millimeter wave system in presence of power amplifier nonlinear distortions, which can be used to avoid the cumbersome evaluation through complex experiments or simulations. The results of the proposed analytical expression is compared to the practical values of computer simulated communication system and verified.","PeriodicalId":111626,"journal":{"name":"2015 International Conference and Workshop on Computing and Communication (IEMCON)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130219660","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Different secured routing protocols for mobile Ad Hoc networks and its vulnerabilities: A review 移动Ad Hoc网络的不同安全路由协议及其漏洞综述
2015 International Conference and Workshop on Computing and Communication (IEMCON) Pub Date : 2015-10-01 DOI: 10.1109/IEMCON.2015.7344453
A. Majumdar, Saptarshi Banerjee
{"title":"Different secured routing protocols for mobile Ad Hoc networks and its vulnerabilities: A review","authors":"A. Majumdar, Saptarshi Banerjee","doi":"10.1109/IEMCON.2015.7344453","DOIUrl":"https://doi.org/10.1109/IEMCON.2015.7344453","url":null,"abstract":"A Mobile Ad Hoc Network (MANET) is self-organizing, infrastructureless, multi-hop network. The open and distributive nature of MANET posses a big challenge to design the secure routing protocols. So, secure routing in MANET has become the important research area. Taking into consideration that there is the possibility for the proper authenticated nodes to come under the control of malicious agents, there must be the presence of secure routing protocols which will permit nodes to work in unfavorable potential system within MANET. In this paper we have illustrated different existing secured routing protocols with their advantages and disadvantages. We have also described the necessity of robust and light weight secured routing protocols to solve problems of existing secured routing protocols.","PeriodicalId":111626,"journal":{"name":"2015 International Conference and Workshop on Computing and Communication (IEMCON)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132787754","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Accumulative feedback adaptation transmission rate in mobile ad-hoc networks 移动自组网中累积反馈自适应传输速率
2015 International Conference and Workshop on Computing and Communication (IEMCON) Pub Date : 2015-10-01 DOI: 10.1109/IEMCON.2015.7344460
Ashraf Al-Sharah, S. Shetty
{"title":"Accumulative feedback adaptation transmission rate in mobile ad-hoc networks","authors":"Ashraf Al-Sharah, S. Shetty","doi":"10.1109/IEMCON.2015.7344460","DOIUrl":"https://doi.org/10.1109/IEMCON.2015.7344460","url":null,"abstract":"Mobile adhoc networks (MANET) are commonly used in a lot of applications in military and civilian domains. MANET are self-organized networks and depend on the ability of each node to optimize the transmission parameters to meet applications' bandwidth requirements. MANET nodes need to adapt their transmission parameters depending on the channel status and network dynamics like variation in node density, traffic, and mobility. In this paper, we will present an accumulative feedback adaptation transmission rate scheme (AFAT) that ensures MANET nodes will be able to maximize the transmission rates to ensure applications' bandwidth requirements are met. AFAT a d o pts a decentralized approach which involves communication of transmission rates between neighboring nodes. The knowledge of neighbor nodes' transmission rates allows an individual node to adjust the rates accordingly. AFAT is scalable because the overhead only involves exchange of transmission rates between neighboring nodes. Simulation results confirm that MANET nodes adopting the AFAT scheme will converge to a transmission rate that will meet applications' bandwidth requirements.","PeriodicalId":111626,"journal":{"name":"2015 International Conference and Workshop on Computing and Communication (IEMCON)","volume":"372 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128353459","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Human decision making expert system which takes decision depending upon previous decisions by weight rearrangement technique 人类决策专家系统是利用权重重排技术根据先前的决策进行决策的系统
2015 International Conference and Workshop on Computing and Communication (IEMCON) Pub Date : 2015-10-01 DOI: 10.1109/IEMCON.2015.7344455
N. Prakash
{"title":"Human decision making expert system which takes decision depending upon previous decisions by weight rearrangement technique","authors":"N. Prakash","doi":"10.1109/IEMCON.2015.7344455","DOIUrl":"https://doi.org/10.1109/IEMCON.2015.7344455","url":null,"abstract":"Expert system is a term that describes a computer program that simulates the judgment and behaviour of a human or an organization that has expert knowledge and experience in a particular field. Our aim is to design an expert system which will help a person to take decision based upon his previous decisions. In other words, our system can analyse human behaviour and can help him take decisions depending upon his previous decisions by predicting what his decision is going to be. Here, the system can aid him to take decisions in various genres for example: Family, Friends, Career/job/current work, Music, Financial status, assets, and education. Each category will have a database of questions, from which the question will be asked to the user. The user will provide answers and depending upon it, the system will arrange weights of parameters and provide final decisions for the user.","PeriodicalId":111626,"journal":{"name":"2015 International Conference and Workshop on Computing and Communication (IEMCON)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122220265","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Characterization of defects in production systems 生产系统缺陷的表征
2015 International Conference and Workshop on Computing and Communication (IEMCON) Pub Date : 2015-10-01 DOI: 10.1109/IEMCON.2015.7344507
M. Vora
{"title":"Characterization of defects in production systems","authors":"M. Vora","doi":"10.1109/IEMCON.2015.7344507","DOIUrl":"https://doi.org/10.1109/IEMCON.2015.7344507","url":null,"abstract":"In complex production systems, finding the right cause for a perceived failure and exact location of the defect causing this failure has always been a painful exercise. In the past, many attempts have been made to characterize the defect along many dimensions. In this paper we present the results of our empirical analysis of the defect reports received from a live financial trading application. Here we analyze these defects along the three practically important dimensions: defect types, root cause factors and correction mechanism. This analysis helps to identify what makes a failure difficult to reproduce and the corresponding defect difficult to uncover. It will improve defect detection ability as well as it will give directions and pointers for the correction measures to be taken.","PeriodicalId":111626,"journal":{"name":"2015 International Conference and Workshop on Computing and Communication (IEMCON)","volume":"117 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114133538","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
FARBAC: A fine-grained administrative RBAC model FARBAC:细粒度的管理RBAC模型
2015 International Conference and Workshop on Computing and Communication (IEMCON) Pub Date : 2015-10-01 DOI: 10.1109/IEMCON.2015.7344526
Xiaoning Jiang, Min-Chen Su, Wenli Shen
{"title":"FARBAC: A fine-grained administrative RBAC model","authors":"Xiaoning Jiang, Min-Chen Su, Wenli Shen","doi":"10.1109/IEMCON.2015.7344526","DOIUrl":"https://doi.org/10.1109/IEMCON.2015.7344526","url":null,"abstract":"Aiming at the deficiency of traditional Role Based Access Control model in practical application, this paper puts forward an improved RBAC administrative model on the basis of RBAC, namely FARBAC (Fine-grained Administrative Role Based Access) model, and also gives the formal description of this model. Apart from the introduction of user groups, object groups and the creation of relationship between user and user groups, object and object groups, user groups and object groups, this model gives full play to the administrative section (administrative roles and administrative permissions). By using a relatively simple mechanism to administrate itself, this model guarantees the access control for the ultimate object, which has certain feasibility and reference value.","PeriodicalId":111626,"journal":{"name":"2015 International Conference and Workshop on Computing and Communication (IEMCON)","volume":"85 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116101665","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
An alternative voltage and frequency monitoring scheme for SCADA based communication in power system using data compression 一种基于数据压缩的电力系统SCADA通信电压频率监测方案
2015 International Conference and Workshop on Computing and Communication (IEMCON) Pub Date : 2015-10-01 DOI: 10.1109/IEMCON.2015.7344469
S. Sarkar, B. Das, Trishayan Dutta, P. Dey, Aindrila Mukherjee
{"title":"An alternative voltage and frequency monitoring scheme for SCADA based communication in power system using data compression","authors":"S. Sarkar, B. Das, Trishayan Dutta, P. Dey, Aindrila Mukherjee","doi":"10.1109/IEMCON.2015.7344469","DOIUrl":"https://doi.org/10.1109/IEMCON.2015.7344469","url":null,"abstract":"Conventionally in SCADA based system used in power system, voltage & frequency is monitored sequentially at regular intervals by employing suitable communication schemes. By suitable data compression techniques, it is possible to compress the measured voltage & frequency data to a reduced single string which is then transmitted to monitoring / control room. At the receiving end, the necessary data can be extracted from the transmitted string by using the respective decompression technique. A MATLAB based system is developed which can produce the compressed string corresponds to input voltage & frequency which can be decoded to obtain the voltage & frequency at the receiving end.","PeriodicalId":111626,"journal":{"name":"2015 International Conference and Workshop on Computing and Communication (IEMCON)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127888501","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信