{"title":"Impact of channel estimation errors on lattice reduction gains in MIMO systems","authors":"T. C. Snehith, K. Anil, A. K. Raju, R. Ramanathan","doi":"10.1109/IADCC.2015.7154776","DOIUrl":"https://doi.org/10.1109/IADCC.2015.7154776","url":null,"abstract":"In this paper, we propose an approach based on Lattice Reduction (LR) algorithm which preserves the channel norm in the presence of estimation errors. We analyze the channel norm of perfect and imperfect channel by employing LR algorithm on both perfect and imperfect channels in MIMO systems with 2, 4, 8 and 16 antennas for various error variances. We conclude that effective detection can be achieved even with imperfect channel by employing LR on those channels.","PeriodicalId":123908,"journal":{"name":"2015 IEEE International Advance Computing Conference (IACC)","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125774048","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
J. Pramod, K. Sahana, A. Akshay, Viswanath Talasila
{"title":"Characterization of Wireless Mesh Network performance in an experimental test bed","authors":"J. Pramod, K. Sahana, A. Akshay, Viswanath Talasila","doi":"10.1109/IADCC.2015.7154837","DOIUrl":"https://doi.org/10.1109/IADCC.2015.7154837","url":null,"abstract":"Studies in Wireless Mesh Networks have often focused on the comparison of various mesh protocols, or the design of new mesh protocols in a simulation environment (such as NS2, OPNET etc.). However the results obtained in a simulation environment are sometimes not valid in a real site where the network is meant to be deployed. This paper describes the development of a new large scale wireless mesh network test bed and a preliminary analysis of three mesh protocols. This experimental test bed can be used to compare various protocols, to design new protocols and perform a detailed testing and so on.","PeriodicalId":123908,"journal":{"name":"2015 IEEE International Advance Computing Conference (IACC)","volume":"IM-30 2","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121009498","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Analysis of hard decision and soft decision decoding algorithms of LDPC codes in AWGN","authors":"R. Jose, A. Pe","doi":"10.1109/IADCC.2015.7154744","DOIUrl":"https://doi.org/10.1109/IADCC.2015.7154744","url":null,"abstract":"This article compares the Bit Error Rate (BER) performance of soft and hard decision decoding algorithms of LDPC codes on AWGN channel at different code rates and Signal to Noise Ratio (SNR) levels. Even though, hard decision decoding algorithm is computationally simple, its BER performance is not appreciable. Devising soft decision decoding algorithms which are simple and good in BER performance requires comparison of probabilistic and log domain methods. Towards this, a code word is generated through modulo(2) addition between message bits and generator matrix. After Binary Phase Shift Keying (BPSK) modulation the AWGN noise is introduced to the modulated code word. BER performance is computed by comparing the message decoded by soft and hard decision algorithms with the transmitted message. The experiment is conducted in MATLAB. Soft decision decoding algorithm in log domain provides better BER performance than hard decision decoding algorithm regardless of the SNR level.","PeriodicalId":123908,"journal":{"name":"2015 IEEE International Advance Computing Conference (IACC)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126753298","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Dynamic election of Cluster Head sensor and proactive mechanism of eliminating sensor","authors":"S. Geetha, P. Deepalakshmi, G. Madhu","doi":"10.1109/IADCC.2015.7154697","DOIUrl":"https://doi.org/10.1109/IADCC.2015.7154697","url":null,"abstract":"Since the wireless sensor network is upgrading, the need for high quality and energy efficient way of using sensors are becoming more important. This paper works with the inventive wireless sensor network based on the selection of better Cluster Head among the other sensor nodes. The communication happens in the network through the Cluster Head, so the battery power of Cluster Head is required to be high. This can be achieved by dynamic elimination of far away sensors. At the same time addition of new sensors for servicing is also possible.","PeriodicalId":123908,"journal":{"name":"2015 IEEE International Advance Computing Conference (IACC)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125199576","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Authentication technique to reduce call setup delay incurred due to authentication in mobiles","authors":"R. Srividya, B. Ramesh","doi":"10.1109/IADCC.2015.7154684","DOIUrl":"https://doi.org/10.1109/IADCC.2015.7154684","url":null,"abstract":"Wireless Mobile Adhoc network is an infrastructure less network which consists of equally distributed self configuring mobile nodes. Secured access to these mobile nodes is a major issue, since these devices are most widely used in our day to day life due to their diverse capabilities like online transactions processing. Designing a reliable authentication technique for users of these mobile nodes with minimum delay incurred for the authentication process is the most vital and challenging task, so that only legitimate users can access their personal data and also communicate with the other mobile devices in the network. In this paper we present an approach for authentication of the Mobile users with minimum time delay incurred for authentication process, which is well explained with a scenario of setting up a call session during an emergency, unlike traditional techniques and hence reducing the average delay caused due to setting up a call session after authenticating the user. Performance valuation indicate that this approach achieves a reliable security for nodes with a minimum time overhead.","PeriodicalId":123908,"journal":{"name":"2015 IEEE International Advance Computing Conference (IACC)","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121882643","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A novel Reverse Converter design for new Five moduli set RNS","authors":"Debabrat Boruah, M. Saikia","doi":"10.1109/IADCC.2015.7154726","DOIUrl":"https://doi.org/10.1109/IADCC.2015.7154726","url":null,"abstract":"Residue Number System (RNS) is widely used in various applications such as design of cryptoprocessor, digital filters etc. For better performance of these RNS systems conversion module should be fast enough. This paper presents a new reverse converter architecture for a novel five moduli set Residue Number System (RNS) {2<sup>n</sup> - 1, 2<sup>n</sup>, 2<sup>n</sup> + 1, 2<sup>n + 1</sup> - 1, 2<sup>n - 1</sup> - 1} for even values of n. It exploits the special properties of the numbers of the form 2<sup>n</sup> ± 1, and extends the dynamic range of the present triple moduli {2<sup>n</sup> - 1, 2<sup>n</sup>, 2<sup>n</sup> + 1} based systems. The proposed moduli set has a dynamic range that can represent upto 5n - 1 bit numbers while keeping the moduli small enough and the converter efficient considering computation required. In our new Five moduli set Reverse Converter design we use both the Chinese Remainder Theorem (CRT) and Mixed Radix Conversion (MRC) techniques.","PeriodicalId":123908,"journal":{"name":"2015 IEEE International Advance Computing Conference (IACC)","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122192519","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Genetic algorithm based feature selection technique for classification of multiple-subject fMRI data","authors":"I. Accamma, H. N. Suma, M. Dakshayini","doi":"10.1109/IADCC.2015.7154844","DOIUrl":"https://doi.org/10.1109/IADCC.2015.7154844","url":null,"abstract":"Functional Magnetic Resonance Imaging (fMRI) is a neuroimaging technique used to capture images of brain activity. These images have high spatial resolution and hence are very high dimensional. Each scan consists of more than one hundred thousand voxels. All of the scanned voxels are not activated for every stimulus. Therefore, finding the informative voxels with respect to stimulus becomes a prerequisite for any machine learning solution using fMRI data. The specific problem attempted to be solved in this paper is that of decoding cognitive states from multiple-subject fMRI data. Decoding multiple-subject data is challenging owing to the difference in the shape and size of the brain of different subjects. A Genetic algorithm based technique is proposed here for selection of voxels that capture commonality across subjects. Some popular feature selection techniques are compared against Genetic algorithms. It is observed that feature selection using Genetic algorithms perform consistently and predictably better than other techniques.","PeriodicalId":123908,"journal":{"name":"2015 IEEE International Advance Computing Conference (IACC)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123394765","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Entity resolution for high velocity streams using semantic measures","authors":"Year M. Tech'padilamanupriya","doi":"10.1109/IADCC.2015.7154663","DOIUrl":"https://doi.org/10.1109/IADCC.2015.7154663","url":null,"abstract":"Now-a-days large amount of data is generated from various stake holders such as data from sensors and satellites regarding environment and climate, social networking sites about messages, tweets, photos, videos and data from telecommunications etc. This big data, if processed in real-time, helps decision makers to make timely decisions when an event occurred. When source data sets are large (velocity, variety, veracity) traditional ETL (Extract, Transform, Load) is time consuming process. This paves path to extend traditional data management techniques for extracting business value from big data. This paper extends the hadoop framework for performing entity resolution in two phases. In phase 1 MapReduce generate rules for matching two real world objects with similarities. The more the similarity, the objects are similar. Similarity is calculated using domain dependent and independent Natural language processing measures. In Phase 2 these rules are used for matching stream data. Our proposed approach uses 13 semantic measures for resolving entities in stream data. Stream data such as tweets, messages, e-catalogues are used for testing the proposed system.","PeriodicalId":123908,"journal":{"name":"2015 IEEE International Advance Computing Conference (IACC)","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130520188","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Non-equilibrium charge transport through quantum dot in magnetic field","authors":"Mahesh Koti, Vinaydatt V. Khoir","doi":"10.1109/IADCC.2015.7154677","DOIUrl":"https://doi.org/10.1109/IADCC.2015.7154677","url":null,"abstract":"Magnetic field effects the charge transport in quantum dot. The grain(quantum dot) I-V characteristics are subject to change due to magnetic field, extent of variation in the Quantum Dot I-V characteristics is function of magnetic field strength, size and type of the Quantum Dot. We present the study of the I-V characteristics of the grain in non-equilibrium and steady state conditions in a magnetic field. We use non-equilibrium green function based technique for the computations.","PeriodicalId":123908,"journal":{"name":"2015 IEEE International Advance Computing Conference (IACC)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116582645","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A novel multi-cast routing protocol for VANET","authors":"A. Joshi, Ranjeet Kaur","doi":"10.1109/IADCC.2015.7154665","DOIUrl":"https://doi.org/10.1109/IADCC.2015.7154665","url":null,"abstract":"Vehicular Ad-Hoc Networks is an ad hoc network connecting mobile vehicles which possess dynamic topology thus low link stability in terms of connectivity. The critical concern in ad hoc routing is routing which is handled via various routing solutions. This paper focuses on improving the I-AODV routing by considering V2V and V2I communication. The I-AODV (Infrastructure based AODV) is routing protocol that facilitate communication among vehicles through RSUs and is broadcasting in nature. This paper discusses prediction based multicasting which aids in reducing delay and improves other performance metrics. Broadcasting technique does not utilizes network resources which makes the network inefficient thus reduces throughput of the network, applying multicasting solves the purpose of proper utilization of resources as well as prediction technique helps in improving localization overhead. This technique improves the network performance metrics such as end-end delay, throughput, fuel emission, packet overhead and Packet Delivery Ratio.","PeriodicalId":123908,"journal":{"name":"2015 IEEE International Advance Computing Conference (IACC)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122294494","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}