2013 International Conference on Communication Systems and Network Technologies最新文献

筛选
英文 中文
Performance Evaluation of ML-VBLAST MIMO Decoder Using Different Antenna Configuration Using Ricean and Rayleigh Channel 基于Ricean和Rayleigh信道的不同天线配置ML-VBLAST MIMO解码器性能评估
G. Singh, P. Mishra, R. Vij
{"title":"Performance Evaluation of ML-VBLAST MIMO Decoder Using Different Antenna Configuration Using Ricean and Rayleigh Channel","authors":"G. Singh, P. Mishra, R. Vij","doi":"10.1109/CSNT.2013.46","DOIUrl":"https://doi.org/10.1109/CSNT.2013.46","url":null,"abstract":"Wireless communication technology employs the application of multiple antennas at both transmitter and receiver sides to improve the data rates through multiplexing or to improve performance through the diversity technique as compared to single antenna systems. In this paper, we studied the BER performance of Maximum Likelihood (ML)-Vertical Bells Lab Layered Space Time Architecture (V-BLAST) Spatial Multiplexing Technique with different modulation techniques such as BPSK and QPSK, in independent identically distributed (i.i.d) flat fading channel like Rayleigh and Ricean Channel. Further, we compared different multiple antenna configuration with BPSK and QPSK modulation techniques in different channel. Finally, we concluded that ML-VBLAST decoding technique using BPSK modulation scheme gives better result than QPSK modulation technique in both the channels. Furthermore, we observed that we obtain optimal result for 1×4 antennas for V-BLAST system in rician fading channel and for Rayleigh channel 4 × 4 antennas for ML-V-BLAST system. Finally, we compared the results of Rayleigh and Ricean Channel for 2 × 2 antenna configurations and we observed that Ricean Channel provide better results as compared to Rayleigh Channel.","PeriodicalId":111865,"journal":{"name":"2013 International Conference on Communication Systems and Network Technologies","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-04-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121844600","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Restructuring of 11/.4 kV Distribution Network of JNKVV Jabalpur to Minimize Losses and Demand 重组11/。jkvv贾巴尔普尔4kv配电网以减少损耗和需求
A. Khare, S. K. Bajpai, M. Choubey
{"title":"Restructuring of 11/.4 kV Distribution Network of JNKVV Jabalpur to Minimize Losses and Demand","authors":"A. Khare, S. K. Bajpai, M. Choubey","doi":"10.1109/CSNT.2013.174","DOIUrl":"https://doi.org/10.1109/CSNT.2013.174","url":null,"abstract":"The rate of demand of electrical energy is much higher than the rate at which generation capacity addition is practically done. This leaves a gap between generation and demand. This paper includes some load management techniques which can load survey data. Data analysis also enables restructure of distribution network to minimize losses and to improve voltage regulation. Similar techniques can be used in govt. /private organization to bridge the gap between generation & demand. This paper also includes the calculation of possible saving based on shifting of transformer near load center and also by relocation of L.T. side cables where the losses & voltage drop crosses the limits. In this way the substantial amount of energy is saved.","PeriodicalId":111865,"journal":{"name":"2013 International Conference on Communication Systems and Network Technologies","volume":"76 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-04-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115956817","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Security Architecture for MANET and Its Application in M-Governance MANET安全体系结构及其在移动治理中的应用
Baljeet Kaur
{"title":"Security Architecture for MANET and Its Application in M-Governance","authors":"Baljeet Kaur","doi":"10.1109/CSNT.2013.108","DOIUrl":"https://doi.org/10.1109/CSNT.2013.108","url":null,"abstract":"Mobile ad hoc networks offer quick and easy deployment of network in situations where it is not possible otherwise. MANET offer unique benefits and versatility if the environment and application is appropriate and m-governance is one such application. MANET can be the best option for m-Governance services where there is no predefined infrastructure. Due to this reason MANETS can be easily adapted to m-Governance. Because of their ad hoc nature MANETS are vulnerable to security attacks. Most of the research in MANETS has focused on routing issues and security has been given a low priority. The layered architecture draws huge support with its success in case of Internet. The Cross Layer Design Architecture is becoming more popular with its performance improvements. In this paper, security architecture is proposed for Cross Layer Design Architecture of MANET. This paper analyzes the security mechanism in m-Governance applications in scope of proposed security architecture.","PeriodicalId":111865,"journal":{"name":"2013 International Conference on Communication Systems and Network Technologies","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-04-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134082492","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A Review on Software Quality Models 软件质量模型综述
B. Singh, S. P. Kannojia
{"title":"A Review on Software Quality Models","authors":"B. Singh, S. P. Kannojia","doi":"10.1109/CSNT.2013.171","DOIUrl":"https://doi.org/10.1109/CSNT.2013.171","url":null,"abstract":"The concern of quality of software product has been increasing in most industrial sectors. In addition, awareness of the central importance of the production process has been increasing. Process is important because industry cares about their intrinsic qualities, such as uniformity of performance across different projects and productivity, with the aim of improving time to market and reducing production costs. But processes are also important because experience has shown that they have a decisive influence on the quality of product that is, by controlling process, we can achieve better control of the required quality of products. The relationship between process and the quality of products holds especially in software production, because of the intrinsic nature of the software. In this paper we have gone through literature of software quality process and software quality models. We have studies some of important models and compare them. These models have been categorized into two i.e. Software development process models &amp, Software product models. Software process models have been applied for many years in an effort to bring order and structure development. Each of these conventional models suggests a somewhat different process flow, but all perform the same set of generic framework activities: Communication, Planning, Modeling, Construction, and deployment. Review also provides the progress in software quality models and practices that can be applied today to achieve the quality of finished product.","PeriodicalId":111865,"journal":{"name":"2013 International Conference on Communication Systems and Network Technologies","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-04-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128924075","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 23
A Method of Unstructured Information Process in Computer Teaching Evaluation System Based on Data Mining Technology 基于数据挖掘技术的计算机教学评价系统非结构化信息处理方法
QUAN LIU, Yongjun Peng
{"title":"A Method of Unstructured Information Process in Computer Teaching Evaluation System Based on Data Mining Technology","authors":"QUAN LIU, Yongjun Peng","doi":"10.1109/CSNT.2013.147","DOIUrl":"https://doi.org/10.1109/CSNT.2013.147","url":null,"abstract":"As colleges and universities in recent years, the scale of the rapid expansion and the continuing reform of the educational system to improve university teaching management and assessment of classroom teaching workload of teachers in colleges increases every year, its complexity is also rising. The computer teaching reform as the high education reform pioneer has obtained some preliminary results. But how to improve the quality of college teaching has become a common concern to workers in high education issue. Carry out the classroom assessment work is conductive to school leadership and teaching management comprehensively and accurately grasp the teaching of information, strengthen education management, improve work efficiency, saving manpower, material and financial resources to improve teaching management science and decision-making. In this paper, focus on the specific computer teaching university management, data mining technology is introduced into the field of university teaching evaluation. We improve and optimize digital feature extraction model, and by teaching evaluation data mining, on the impact of teaching quality assessment scores of students, teaching a plus, ability to control factors such as class analysis, to find scores of teachers teaching the mapping between the various properties, and uses the data to test and eventually developed based on B / S structure of secondary school teachers in computer teaching evaluation system. It provides a supportive policy decision for education departments, this is helpful to develop teaching management and improve the quality of teaching in a better way.","PeriodicalId":111865,"journal":{"name":"2013 International Conference on Communication Systems and Network Technologies","volume":"126 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-04-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132234999","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Range Based Wireless Sensor Node Localization Using PSO and BBO and Its Variants 基于PSO和BBO及其变体的距离无线传感器节点定位
Satvir Singh, Shivangna Shivangna, E. Mittal
{"title":"Range Based Wireless Sensor Node Localization Using PSO and BBO and Its Variants","authors":"Satvir Singh, Shivangna Shivangna, E. Mittal","doi":"10.1109/CSNT.2013.72","DOIUrl":"https://doi.org/10.1109/CSNT.2013.72","url":null,"abstract":"Accurate location of target node is highly desirable in a Wireless Sensor Network (WSN) as it has strong impact on overall performance of the WSN. This paper proposes the application of different migration variants of Biogeography-Based Optimization (BBO) algorithms and Particle Swarm Optimization (PSO) for distributed optimal localization of randomly deployed sensors. Biogeography is collective learning of geographical allotment of biological organisms. BBO has a new inclusive vigor based on the science of biogeography and employs migration operator to share information between different habitats, i.e., problem solution. PSO models had only fast convergence but less mature. An investigation on distributed iterative localization is presented in this paper. Here the nodes that get localized in iteration act as anchor node. A comparison of the performance of PSO and different migration variants of BBO in terms of number of nodes localized, localization accuracy and computation time is presented.","PeriodicalId":111865,"journal":{"name":"2013 International Conference on Communication Systems and Network Technologies","volume":"522 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-04-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133251956","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 49
Performance Evaluation of Routing Protocols in Mobile Ad-Hoc Networks with Varying Node Density and Node Mobility 具有不同节点密度和节点移动性的移动Ad-Hoc网络中路由协议的性能评估
Thriveni H B, G. Manoj Kumar, Rinki Sharma
{"title":"Performance Evaluation of Routing Protocols in Mobile Ad-Hoc Networks with Varying Node Density and Node Mobility","authors":"Thriveni H B, G. Manoj Kumar, Rinki Sharma","doi":"10.1109/CSNT.2013.60","DOIUrl":"https://doi.org/10.1109/CSNT.2013.60","url":null,"abstract":"Mobile Ad-hoc Network (MANET) is a collection of mobile nodes which can self-organize freely and dynamically into arbitrary and temporary network topologies. Mobile nodes in ad-hoc networks can dynamically establish routes among themselves by means of a routing protocol. Therefore, selection of an appropriate routing protocol is an integral part of establishing a MANET. Apart from the choice of routing protocol, nodes present in the network (node density) and their level of mobility (node mobility) also affect the performance of the network. In this paper, we have studied and analyzed the impact of variations in node velocity and node density combined with the choice of routing protocol, on network performance. We have selected Destination-Sequenced Distance Vector (DSDV) which is a proactive routing protocol, and Dynamic Source Routing (DSR) which is a reactive routing protocol, for our study. The network performance is measured in terms of Packet Delivery Ratio (PDR), End-to-End Delay and Throughput. The simulations are carried out in NS2.34.","PeriodicalId":111865,"journal":{"name":"2013 International Conference on Communication Systems and Network Technologies","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-04-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131313815","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
Importance of Cryptography in Network Security 密码学在网络安全中的重要性
T. Devi
{"title":"Importance of Cryptography in Network Security","authors":"T. Devi","doi":"10.1109/CSNT.2013.102","DOIUrl":"https://doi.org/10.1109/CSNT.2013.102","url":null,"abstract":"The main aim of this paper is to provide a broad review of network security and cryptography, with particular regard to digital signatures. Network security and cryptography is a subject too wide ranging to coverage about how to protect information in digital form and to provide security services. However, a general overview of network security and cryptography is provided and various algorithms are discussed. A detailed review of the subject of network security and cryptography in digital signatures is then presented. The purpose of a digital signature is to provide a means for an entity to bind its identity to a piece of information. The common attacks on digital signature were reviewed. The first method was the RSA signature scheme, which remains today one of the most practical and versatile techniques available. Fiat-Shamir signature schemes, DSA and related signature schemes are two other methods reviewed. Digital signatures have many applications in information security, including authentication, data integrity, and non-repudiation was reviewed.","PeriodicalId":111865,"journal":{"name":"2013 International Conference on Communication Systems and Network Technologies","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-04-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114422688","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 28
Intelligent Automatic Generation Control of Two-Area Hydrothermal Power System Using ANN and Fuzzy Logic 基于神经网络和模糊逻辑的两区水热电系统智能自动发电控制
R. Verma, S. Pal, S. Sathans
{"title":"Intelligent Automatic Generation Control of Two-Area Hydrothermal Power System Using ANN and Fuzzy Logic","authors":"R. Verma, S. Pal, S. Sathans","doi":"10.1109/CSNT.2013.119","DOIUrl":"https://doi.org/10.1109/CSNT.2013.119","url":null,"abstract":"This study presents the design and implementation of intelligent controllers, based on artificial neural networks (ANN) and fuzzy logic, for automatic generation control (AGC) of a two area hydrothermal power system. The AGC performance with intelligent controllers is compared with the performance of conventional optimized integral and tuned PID controllers under step load disturbance. Comparative analysis of results shows considerable improvement in system performance with intelligent controllers following a load disturbance in either of the areas. The ANN controller gives better dynamic response, reduced error magnitude and minimized frequency transients. The performance of fuzzy controller is almost similar to that of ANN controller.","PeriodicalId":111865,"journal":{"name":"2013 International Conference on Communication Systems and Network Technologies","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-04-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117099098","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 26
FPGA Implementation of Discrete Fourier Transform Core Using NEDA 基于NEDA的离散傅立叶变换核的FPGA实现
A. Mankar, N. Prasad, S. Meher
{"title":"FPGA Implementation of Discrete Fourier Transform Core Using NEDA","authors":"A. Mankar, N. Prasad, S. Meher","doi":"10.1109/CSNT.2013.152","DOIUrl":"https://doi.org/10.1109/CSNT.2013.152","url":null,"abstract":"Transforms like Discrete Fourier Transform (DFT) are a major block in communication systems such as OFDM, etc. This paper reports architecture of a DFT core using new distributed arithmetic (NEDA) algorithm. The advantage of the proposed architecture is that the entire transform can be implemented using adder/subtractors and shifters only, thus minimising the hardware requirement compared to other architectures. The proposed design is implemented for 16 - bit data path (12 - bit for comparison) considering both integer representation as well as fixed point representation, thus increasing the scope of usage. The proposed design is mapped on to Xilinx XC2VP30-7FF896 FPGA, which is fabricated using 130 nm process technology. The hardware utilization of the proposed design on the mapped FPGA is 295 slices, 478 4-input LUTs and 304 slice flip flops. The maximum on board frequency of operation of the proposed design is 79.339 MHz. The proposed design has 72.27% improvement in area, 10.31% improvement in both maximum clock frequency and throughput when compared to other designs.","PeriodicalId":111865,"journal":{"name":"2013 International Conference on Communication Systems and Network Technologies","volume":"187 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-04-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124734645","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信