International Conference on Information Communication and Embedded Systems (ICICES2014)最新文献

筛选
英文 中文
Comparative analysis of Wi-Fi and WiMAX Wi-Fi和WiMAX的对比分析
D. Selvarani, T. Ravi
{"title":"Comparative analysis of Wi-Fi and WiMAX","authors":"D. Selvarani, T. Ravi","doi":"10.1109/ICICES.2014.7033799","DOIUrl":"https://doi.org/10.1109/ICICES.2014.7033799","url":null,"abstract":"Wireless networking provides an alternative answer for the problem of accessing information from the remote areas where the wired networks are not possible due to high cost. It has simply changed the way in which people can communicate and share information, without worrying about the location or distance. Two such popular wireless broadband networks are Wireless Fidelity (Wi-Fi) and Worldwide Interoperability for Microwave Access (WiMax). Wi-Fi is for Wireless Local Area Network with the standard IEEE802.11 and WiMax is for Wireless Metropolitan Area Network with the standard IEEE 802.16. These technologies aim to provide broadband wireless access to residential areas and small business enterprises, in addition to providing internet access in countries without any wired network infrastructure. This paper provides an overview of Wi-Fi and WiMax technologies including the features, specifications, architecture, advantages, limitations and security. Finally a comparison is made between Wi-Fi and WiMax. It is suggested that when Wi-Fi is synergized with WiMax, it will provide the best solution for last mile coverage.","PeriodicalId":13713,"journal":{"name":"International Conference on Information Communication and Embedded Systems (ICICES2014)","volume":"37 1","pages":"1-7"},"PeriodicalIF":0.0,"publicationDate":"2014-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85941584","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
MUX-based design of DPLL for wireless communication 基于mux的无线通信DPLL设计
Sabyasachi Bhattacharyya, R. Sarma, K. Bhattacharyya, Ragib Nasir Ahmed, Roushan Saikia
{"title":"MUX-based design of DPLL for wireless communication","authors":"Sabyasachi Bhattacharyya, R. Sarma, K. Bhattacharyya, Ragib Nasir Ahmed, Roushan Saikia","doi":"10.1109/ICICES.2014.7033978","DOIUrl":"https://doi.org/10.1109/ICICES.2014.7033978","url":null,"abstract":"For modern day communication devices, the key aspect lies in the proper reception of data at minimum possible error rates and also on maintenance of great degrees of precision. But, while doing so, a very important aspect that should be kept in mind is the ability of the device developed to operate at reasonable speeds, because it must be compatible with the other sub-systems of the communication setup. Also, the design complexity of the device and the cost of design should be minimum. By putting all these factors together, we can define a common term called time complexity which is the main concern of this proposed work. Considering the various constraints at hand, we would like to propose the design of a Multiplexer-based DPLL device which comprises of features such as good speed, simplified design and precise reception of data.","PeriodicalId":13713,"journal":{"name":"International Conference on Information Communication and Embedded Systems (ICICES2014)","volume":"435 1","pages":"1-4"},"PeriodicalIF":0.0,"publicationDate":"2014-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76768650","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Visual and tag-based social image search based on hypergraph ranking method 基于超图排序方法的视觉和基于标签的社交图像搜索
K. Manjula, S. Palanivel, Rajan Asst Professor
{"title":"Visual and tag-based social image search based on hypergraph ranking method","authors":"K. Manjula, S. Palanivel, Rajan Asst Professor","doi":"10.1109/ICICES.2014.7034079","DOIUrl":"https://doi.org/10.1109/ICICES.2014.7034079","url":null,"abstract":"Due to the popularity of social media Web sites, extensive research efforts have been dedicated to tag-based social image search. Both visual information and tags have been investigated in the research field. However, most existing methods use tags and visual characteristics either separately or sequentially in order to estimate the relevance of images. In this paper, simultaneously utilizes both visual and textual information to estimate the relevance of user tagged images. The relevance estimation is determined with a hypergraph learning approach. In this method, a social image hypergraph is constructed, where vertices represent images and hyperedges represent visual or textual terms. Learning is achieved with use of a set of pseudo-positive images, where the weights of hyperedges are updated throughout the learning process. In this way, the impact of different tags and visual words can be automatically modulated. Comparative results of the experiments conducted on a dataset including 370 images are presented, which demonstrate the effectiveness of the proposed approach.","PeriodicalId":13713,"journal":{"name":"International Conference on Information Communication and Embedded Systems (ICICES2014)","volume":"190 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2014-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77034384","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
A drawing robotic hand based on inverse kinematics 基于逆运动学的绘图机械手
Shubham Agarwal, S. Rawat, V. Sumathi
{"title":"A drawing robotic hand based on inverse kinematics","authors":"Shubham Agarwal, S. Rawat, V. Sumathi","doi":"10.1109/ICICES.2014.7034005","DOIUrl":"https://doi.org/10.1109/ICICES.2014.7034005","url":null,"abstract":"The paper aims to create a robotic hand having the capability of self drawing. The application of hand is to artificially evolve drawing patterns using the given function. It describes the implementations and theory of converting the visual information to depict into pictorial view. Inverse kinematics is a method used for pronouncing the same. A target is given as an input by the user and accordingly it sketches the same contours on the paper. The purpose behind using inverse kinematics lies in the fact that it doesn't need the information about the location of each specific limb and hereby angle between them it uses mathematical equations to calculate the angle by itself. The robotic hand equipped with prismatic (translational) and revolute (rotational) joint works well even at increased complexity. This work is further extended to make it as an autonomous system. Few example figures are taken as input to test the system and they are plotted without any human intervene.","PeriodicalId":13713,"journal":{"name":"International Conference on Information Communication and Embedded Systems (ICICES2014)","volume":"32 1","pages":"1-5"},"PeriodicalIF":0.0,"publicationDate":"2014-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77247711","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Data hiding in gray scale images using Integer Wavelet Transform 利用整数小波变换在灰度图像中隐藏数据
S. Maheswari, D. Hemanth
{"title":"Data hiding in gray scale images using Integer Wavelet Transform","authors":"S. Maheswari, D. Hemanth","doi":"10.1109/ICICES.2014.7034037","DOIUrl":"https://doi.org/10.1109/ICICES.2014.7034037","url":null,"abstract":"This paper presents a novel data hiding using Integer Wavelet Transform (TWT) through lifting scheme that aims to achieve high quality of stego image. This method transforms a spatial domain cover image into a frequency domain cover image. It hides the secret message into detail coefficients (CH, CV, CD) of IWT by construct a binary image in any of selected bit in CH, CV, CD separately and compresses that bit by using arithmetic coding. This method is very simple and effective.","PeriodicalId":13713,"journal":{"name":"International Conference on Information Communication and Embedded Systems (ICICES2014)","volume":"12 1","pages":"1-5"},"PeriodicalIF":0.0,"publicationDate":"2014-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80974328","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Semantics based access management framework for securing data in cloud 基于语义的云数据访问管理框架
Auxilia M, K Raja
{"title":"Semantics based access management framework for securing data in cloud","authors":"Auxilia M, K Raja","doi":"10.1109/ICICES.2014.7033866","DOIUrl":"https://doi.org/10.1109/ICICES.2014.7033866","url":null,"abstract":"Data security is one of the critical issues in evaluating cloud based services. The reason is that even a naive user can store his/her data in any cloud storage provided by diverse cloud service providers. Each cloud service provider has his/her own access control policies written in diverse policy languages and schemes. Most of the traditional access control policies like MAC, DAC, and RBAC lack consideration about the relationship between access control entities. In this paper, we propose a semantic based access management framework which considers the semantic relationship between the access control entities like subject, object and action. This framework works for diverse cloud service providers and users and provides fine granular access control over the data stored in cloud.","PeriodicalId":13713,"journal":{"name":"International Conference on Information Communication and Embedded Systems (ICICES2014)","volume":"10 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2014-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85833726","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A survey on video distribution services in cloud computing 云计算中视频分发服务的调查
P. Sobiya, M. G. Nayagam, K. Ramar
{"title":"A survey on video distribution services in cloud computing","authors":"P. Sobiya, M. G. Nayagam, K. Ramar","doi":"10.1109/ICICES.2014.7033800","DOIUrl":"https://doi.org/10.1109/ICICES.2014.7033800","url":null,"abstract":"Cloud computing is a new infrastructure environment that delivers on the promise of supporting on-demand services in a flexible manner by scheduling bandwidth, storage and compute resources on the fly. Content delivery networks (CDN) based systems are considered as the potential solutions to deliver User-generated content (UGC). But none of the existing CDN based solutions can support all the required features in UGC delivery. In this paper we analyses the various mechanism for deploying video in geographically distributed cloud server and optimal utilization of bandwidth, storage and other computing resources. Optimal Deployment can be done by using Nash Bargaining solutions, Greedy algorithm, Convex optimization and Lagrange Duality methods are used.","PeriodicalId":13713,"journal":{"name":"International Conference on Information Communication and Embedded Systems (ICICES2014)","volume":"3 1","pages":"1-7"},"PeriodicalIF":0.0,"publicationDate":"2014-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84073477","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Monte Carlo-rough based mixed-integer probablistic non-linear programming model for predicting and minimizing unavailability of power system components 基于蒙特卡罗粗糙的混合整数概率非线性规划模型预测和最小化电力系统部件的不可用性
A. Dube, Prateek Saraf, R. Dashora, Rohit Singh
{"title":"A Monte Carlo-rough based mixed-integer probablistic non-linear programming model for predicting and minimizing unavailability of power system components","authors":"A. Dube, Prateek Saraf, R. Dashora, Rohit Singh","doi":"10.1109/ICICES.2014.7034152","DOIUrl":"https://doi.org/10.1109/ICICES.2014.7034152","url":null,"abstract":"Data mining processes were initially invented and developed for finding out meaningful information and deriving rules from more recent data sets. With growth in the size of power systems due to the increased requirements of industries and cities for uninterrupted power supply, data mining in electrical systems has emerged as a very efficient tool for continuous assessment of power systems. In this paper we propose Rough Set based knowledge discovery for predicting faults and probability of failure in high voltage equipment present in a real electrical systems. The approach has several different steps viz. analysis of real time data, creation and population of databases, pre-processing of data and use of rough sets based data mining algorithm to finally determine the set of rules for knowledge discovery. The methodology has been validated by presenting a case study and application of the algorithm on real time data.","PeriodicalId":13713,"journal":{"name":"International Conference on Information Communication and Embedded Systems (ICICES2014)","volume":"56 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2014-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78539875","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Comfortable perception mining in videos using fuzzy logic 基于模糊逻辑的视频舒适感知挖掘
S. Jeeva, V. Saranya
{"title":"Comfortable perception mining in videos using fuzzy logic","authors":"S. Jeeva, V. Saranya","doi":"10.1109/ICICES.2014.7033868","DOIUrl":"https://doi.org/10.1109/ICICES.2014.7033868","url":null,"abstract":"In this paper a fuzzy based approach is used for Effective retrieval of video. Initially a video is partitioned into frames and then we use fuzzy logic method in order to retrieve a video. While existing search engines like Google and yahoo provide a video retrieving through manual textual queries. We provide an advanced concept of giving a relevant image as an input in order to rescue the video. While text based queries uses color histograms our concept makes great advantage of fuzzy logic in order to provide an accurate result.","PeriodicalId":13713,"journal":{"name":"International Conference on Information Communication and Embedded Systems (ICICES2014)","volume":"39 1","pages":"1-7"},"PeriodicalIF":0.0,"publicationDate":"2014-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77431399","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Performance analysis of malicious nodes in IEEE 802.15.4 based wireless sensor network 基于IEEE 802.15.4无线传感器网络中恶意节点的性能分析
Krishan Kant Varshney, P. Samundiswary
{"title":"Performance analysis of malicious nodes in IEEE 802.15.4 based wireless sensor network","authors":"Krishan Kant Varshney, P. Samundiswary","doi":"10.1109/ICICES.2014.7033873","DOIUrl":"https://doi.org/10.1109/ICICES.2014.7033873","url":null,"abstract":"Wireless sensor network (WSN) has diverse field of applications, but on the other hand it is very much prone to the various security threats. There are number of attacks on wireless sensor networks like black hole attack, selective forwarding attacks, sink hole attack sybil attack etc. This paper concentrates on the performance of wireless sensor network in the presence of black hole attackers using Ad-hoc on Demand Distance Vector Routing Protocol (AODV). The black hole type of attacker node absorbs every message passing through it. So the affected node attacks the whole traffic in the network Further, the performance of sensor network using AODV with and without black hole attack is also analyzed. The simulation is done by using NS-2.35.","PeriodicalId":13713,"journal":{"name":"International Conference on Information Communication and Embedded Systems (ICICES2014)","volume":"23 1","pages":"1-5"},"PeriodicalIF":0.0,"publicationDate":"2014-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77852309","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信