International Conference on Information Communication and Embedded Systems (ICICES2014)最新文献

筛选
英文 中文
Efficient channel sensing schemes for multiuser in mutichannel Cognitive Radio networks 多信道认知无线网络中高效的多用户信道感知方案
R. Mahalakshmi, R. Vijayakarthika
{"title":"Efficient channel sensing schemes for multiuser in mutichannel Cognitive Radio networks","authors":"R. Mahalakshmi, R. Vijayakarthika","doi":"10.1109/ICICES.2014.7034082","DOIUrl":"https://doi.org/10.1109/ICICES.2014.7034082","url":null,"abstract":"The rapid growth of wireless devices has to a dramatically increased in the needs of spectrum access from wireless services. Cognitive Radio (CR) technology is a promising solution to enhance the spectrum utilization by enabling unlicensed users to exploit the licensed spectrum in an opportunistic manner. In this paper, sequential channel sensing problems for single and multiple secondary users (SUs) networks are powerfully modeled through finite state Markovian processes. The objective of this paper is to maximize the throughput for secondary user and reduced the number of handovers. A model for single user case is introduced and its performance is validated through analytical analysis. A modified p-persistent access (MPPA) protocol is proposed for multiple user. Since the method utilized experiences a high level of collision among the SUs, to mitigate the problem appropriately, p-persistent random access (PPRA) protocol is considered, which offers higher average throughput for SUs. The structure of the proposed scheme is discussed in detail, and its efficiencies are verified through a set of illustrative numerical result.","PeriodicalId":13713,"journal":{"name":"International Conference on Information Communication and Embedded Systems (ICICES2014)","volume":"30 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2014-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81389305","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
RFID sensors for food safety centre by identifying the physical factors that affecting the food RFID传感器为食品安全中心通过识别影响食品的物理因素
Madderi Sivalingam Saravanan, Jeyanta Kumar Singh, N. Thirumoorthy
{"title":"RFID sensors for food safety centre by identifying the physical factors that affecting the food","authors":"Madderi Sivalingam Saravanan, Jeyanta Kumar Singh, N. Thirumoorthy","doi":"10.1109/ICICES.2014.7033876","DOIUrl":"https://doi.org/10.1109/ICICES.2014.7033876","url":null,"abstract":"The Radio Frequency Identification (RFID) system is combination of a tag and reader. The RFID tag provides a cost effective solution to identify the object. The object may be any living and non living. The RFID system is used many applications such as healthcare, sales supply chain, luggage identification and security enabled keys, etc. These applications were discussed in various research papers, but till now, no one introduced the food safety centre enabled RFID system. That is the physical factors affecting the food to get into contaminated need to be identified and remedy need to be taken for the same. This RFID system needs to be integrated with the Wireless Sensor Network (WSN) Enabled Architecture. So this system is called as RFID Sensor. This research paper also presents three various methodologies to identify the physical affect that affecting the food. At the end of this paper, discuss about how the RFID Sensor is going to be introduce in the Food Safety Centre in Indian Ration Shops.","PeriodicalId":13713,"journal":{"name":"International Conference on Information Communication and Embedded Systems (ICICES2014)","volume":"19 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2014-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82526315","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
A novel image zero-watermarking scheme based on DWT-BN-SVD 一种基于DWT-BN-SVD的图像零水印方案
Y. Rao, E. Nagabhooshanam
{"title":"A novel image zero-watermarking scheme based on DWT-BN-SVD","authors":"Y. Rao, E. Nagabhooshanam","doi":"10.1109/ICICES.2014.7034073","DOIUrl":"https://doi.org/10.1109/ICICES.2014.7034073","url":null,"abstract":"This paper presents, a novel watermarking scheme for digital images which overcomes the problems associated with singular value decomposition. Here, the singular values of the host image are modified using the principal components of the watermark in the DWT domain for providing copyright protection as well as reliability. This method accomplishes with an incorporation of fractional singular values in the scheme for finding the optimum scaling factors for efficient robustness and the fidelity of the scheme. By using this method we could eliminate the false positive problem and diagonal line problem which were found in the traditional singular value decomposition, the proposed scheme is tested under various forms of image processing attacks like noise addition, median filtering, JPEG compression, Geometric cropping Experimental results are provided to illustrate that the proposed scheme succeeded in providing copyright protection.","PeriodicalId":13713,"journal":{"name":"International Conference on Information Communication and Embedded Systems (ICICES2014)","volume":"28 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2014-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81048972","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Imbedded spiral antenna for endoscope 内窥镜内嵌螺旋天线
Anila P. George, M. Sujatha
{"title":"Imbedded spiral antenna for endoscope","authors":"Anila P. George, M. Sujatha","doi":"10.1109/ICICES.2014.7034105","DOIUrl":"https://doi.org/10.1109/ICICES.2014.7034105","url":null,"abstract":"This paper analyses the characteristics of dual spiral antenna with varying length. This antenna is operated in the lower band of the radio frequency range, since human body absorbs the microwave signals. Here the concept of multilayer substrate is used in order to reduce the size of the antenna. The existing system has several limitations. Firstly, most capsules are powered by an internal battery cell that restricts capsule miniaturization. Secondly, current systems are incapable of maintaining a continuous communication link due to the random orientations of the capsule. Therefore an efficient communication link between the in-body capsule and the external receiver unit is important for the development and applicability of the Wireless Capsule Endoscopy (WCE). These limitations are overcome by this proposed antenna. Since the proposed antenna provides an omnidirectional radiation pattern and ultra wide bandwidth for short distance communication between transmitting and the receiving antenna with low power consumption. By combining two spiral antennas with different radius of the radiation zone, the Standing Wave Ratio (SWR) can be kept low for a large bandwidth, resulting in an improved spiral antenna performance.","PeriodicalId":13713,"journal":{"name":"International Conference on Information Communication and Embedded Systems (ICICES2014)","volume":"1 1","pages":"1-5"},"PeriodicalIF":0.0,"publicationDate":"2014-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81151644","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Production inventory model for two levels of production with defective items and shortages 有缺陷品和短缺品的两级生产的生产库存模型
C. K. Sivashankari
{"title":"Production inventory model for two levels of production with defective items and shortages","authors":"C. K. Sivashankari","doi":"10.1109/ICICES.2014.7033933","DOIUrl":"https://doi.org/10.1109/ICICES.2014.7033933","url":null,"abstract":"In this paper, a production inventory model with defective items in which two levels of production are considered and it is possible that production started at one rate and after some time it may be switched over another rate such a situation is desirable in the sense that by starting at a low rate of production, a large quantum stock of manufacturing items at the initial stage is avoided, leading to reduction in the holding cost. A suitable mathematical model is developed and the optimal production lot size which minimizes the total cost is derived. The optimal solution is derived and an illustrative example is provided and numerically verified. The validation of result in this model was coded in Microsoft Visual Basic 6.0.","PeriodicalId":13713,"journal":{"name":"International Conference on Information Communication and Embedded Systems (ICICES2014)","volume":"32 1","pages":"1-7"},"PeriodicalIF":0.0,"publicationDate":"2014-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91078982","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Microstrip circular patch antenna using with and without sorting vias 带和不带分选过孔的微带圆形贴片天线
R. Subbulakshmi, P. T. Sivagurunathan
{"title":"Microstrip circular patch antenna using with and without sorting vias","authors":"R. Subbulakshmi, P. T. Sivagurunathan","doi":"10.1109/ICICES.2014.7034113","DOIUrl":"https://doi.org/10.1109/ICICES.2014.7034113","url":null,"abstract":"In this paper Micro strip Probe feed Circular patch antenna is designed with and without sorting vias. Such circular patch antenna is shorted concentrically with a set of conductive vias. This type of antenna can produce a monopole-like radiation pattern with wide impedance bandwidth characteristics. The patch antenna is designed and simulated on HFSS simulation software and it is designed to operate in S-band frequency range 2.4GHz. In this analysis, we have analyzed the antenna parameters such as gain, impedance, Radiation Pattern and VSWR. This antenna is highly suitable for S-band applications such as satellite communication, Radar, Medical applications, and other Wireless systems.","PeriodicalId":13713,"journal":{"name":"International Conference on Information Communication and Embedded Systems (ICICES2014)","volume":"1 1","pages":"1-4"},"PeriodicalIF":0.0,"publicationDate":"2014-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90000405","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Authenticated secure bio-metric based access to the bank safety lockers 通过身份验证的安全生物识别技术可以进入银行保险箱
S. Sridharan
{"title":"Authenticated secure bio-metric based access to the bank safety lockers","authors":"S. Sridharan","doi":"10.1109/ICICES.2014.7034063","DOIUrl":"https://doi.org/10.1109/ICICES.2014.7034063","url":null,"abstract":"This paper focuses on providing a secure, authentic and user-friendly mechanism for both the customer's of the bank holding a locker and the branch head's involvement in all the operations pertaining to the safety lockers. The primary aim of this paper is to provide a solution towards a complete biometric based authentication mechanism for operating the safety lockers. This system rests on improving the current fact that all the lockers that operates currently operates only with the help of two different keys - one the branch head's key and other the user key. Improvement towards the current model that relies heavily on the key of the user is proposed which helps in the functioning of the locker with bio-metric and secret code (password). The main features that are proposed in the new mechanism is the two level authentication - one by the branch head and one by the user for their identities, secure individual authentication with their bio-metrics and the access only to the concerned individuals for their safety lockers. The branch head responsible for the operation of the safety deposits is assigned in a daily basis by the central regional office of that particular bank.","PeriodicalId":13713,"journal":{"name":"International Conference on Information Communication and Embedded Systems (ICICES2014)","volume":"44 1","pages":"1-7"},"PeriodicalIF":0.0,"publicationDate":"2014-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87881818","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Design and implementation of Three Phase Commit Protocol (3PC) directory structure through Remote Procedure Call (RPC) application 通过远程过程调用(RPC)应用程序设计和实现三相提交协议(3PC)目录结构
Nitesh Kumar, Ashish Kumar, Soumyajit Giri
{"title":"Design and implementation of Three Phase Commit Protocol (3PC) directory structure through Remote Procedure Call (RPC) application","authors":"Nitesh Kumar, Ashish Kumar, Soumyajit Giri","doi":"10.1109/ICICES.2014.7033930","DOIUrl":"https://doi.org/10.1109/ICICES.2014.7033930","url":null,"abstract":"Transaction is a set of/unit of sequential operations, which is used for a purpose of Technological, Organizational, programming languages, and operating systems. It examines the performance of the transaction manager with the help of Remote Procedure Calls (RPC) Applications. Remote Procedure Call is a distributed application for constructing the distributed database system. When it communicates between the sender side (client side) and receiver side (server side). It executes the ensure atomicity protocols. Simple optimization of Two Phase Commit Protocol (2PC) reduces non-blocking commit, logging activity, multi-threading design, and improved throughput, reduce multicasting, and reduces the variance of distributed commit protocol. It is totally based on Three Phase Commit Protocol (3PC) in a communication network infrastructure environment such as (LAN, WAN, MAN, etc.), and the performance of the transaction mechanism such as RPC Techniques depends upon the client and server performance. In this paper, we provide a detail examination of the design and performance of the transaction manager of the RPC Applications and we also compile the code and it's create a file, then after that it will execute the code step by step.","PeriodicalId":13713,"journal":{"name":"International Conference on Information Communication and Embedded Systems (ICICES2014)","volume":"140 1","pages":"1-5"},"PeriodicalIF":0.0,"publicationDate":"2014-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86661611","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Synchronization of Lu and Bhalekar-Gejji chaotic systems using sliding mode control Lu和Bhalekar-Gejji混沌系统的滑模同步控制
J. P. Singh, P. Singh, B. K. Roy
{"title":"Synchronization of Lu and Bhalekar-Gejji chaotic systems using sliding mode control","authors":"J. P. Singh, P. Singh, B. K. Roy","doi":"10.1109/ICICES.2014.7034171","DOIUrl":"https://doi.org/10.1109/ICICES.2014.7034171","url":null,"abstract":"In this paper synchronization of two different chaotic systems is proposed using Sliding Mode Control scheme. Lu chaotic system is used as master system and Bhalekar-Gejji chaotic system is used as slave system. Convergence of the synchronizing error is achieved using the Lyapunov stability theory. Synchronization of master and slave system is achieved using the PI (Proportional-Integral) switching surface of the sliding mode control scheme. Finally, numerical simulations are proposed to demonstrate the effectiveness of proposed synchronization strategy.","PeriodicalId":13713,"journal":{"name":"International Conference on Information Communication and Embedded Systems (ICICES2014)","volume":"1 1","pages":"1-5"},"PeriodicalIF":0.0,"publicationDate":"2014-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87432282","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Stronger authentication for password using virtual password and secret little functions 使用虚拟密码和秘密小函数对密码进行更强的认证
P. Umadevi, V. Saranya
{"title":"Stronger authentication for password using virtual password and secret little functions","authors":"P. Umadevi, V. Saranya","doi":"10.1109/ICICES.2014.7033936","DOIUrl":"https://doi.org/10.1109/ICICES.2014.7033936","url":null,"abstract":"People enjoy the convenience of on-line services, Automated Teller Machines (ATMs), and pervasive computing, but online environments, ATMs, and pervasive computing may bring many risks by adversaries. To prevent users passwords from adversaries by implementing a differentiated virtual password concept in which a user has the freedom to choose a virtual password scheme ranging from weak security to strong security, where a virtual password requires a small amount of human computing to secure users passwords. A user-specified function/program is used to implement the virtual password concept with a tradeoff of security for complexity requiring a small amount of human computing. Further we propose several functions to serve as system recommended functions and provide a security analysis. For user-specified functions, we adopt a secret little functions in which security is enhanced by hiding secret functions/algorithms. Analyze how the proposed scheme defends against phishing, key logger, and shoulder-surfing attacks. The virtual password mechanism is the first one which is able to defend against all three attacks together.","PeriodicalId":13713,"journal":{"name":"International Conference on Information Communication and Embedded Systems (ICICES2014)","volume":"71 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2014-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88535490","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信