2016 International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET)最新文献

筛选
英文 中文
Development of non-invasive diagnostic tool for diseases using Photo Plethysmography 非侵入性疾病诊断工具的发展
S. More, Pranali C. Chaudhari
{"title":"Development of non-invasive diagnostic tool for diseases using Photo Plethysmography","authors":"S. More, Pranali C. Chaudhari","doi":"10.1109/WISPNET.2016.7566387","DOIUrl":"https://doi.org/10.1109/WISPNET.2016.7566387","url":null,"abstract":"Photo plethysmography (PPG) uses infrared light to measure the blood volumetric changes occurring in the various parts of the body. PPG is non-invasive, inexpensive, and convenient diagnostic tool. Photo plethysmography (PPG) sensor is one among the wide variety of optical sensors available. PPG signal is information source related to cardio-pulmonary system. Traditionally, it's been used to measure the oxygen saturation, blood pressure and for assessing autonomic functions. Recent studies emphasize the potential information embedded in the PPG waveform signal and require attention for its possible applications beyond pulse oximetry and heart-rate calculation. Therefore, this paper discusses different types of plethysmography signal, characteristic features of PPG waveform, and algorithm to denoise the signal, and proposes algorithm to develop indexes to diagnose diseases using PPG signal.","PeriodicalId":138911,"journal":{"name":"2016 International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132069160","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Algorithm for pre-processing chest-x-ray using multi-level enhancement operation 基于多级增强操作的胸部x线预处理算法
S. Savitha, N. Naveen
{"title":"Algorithm for pre-processing chest-x-ray using multi-level enhancement operation","authors":"S. Savitha, N. Naveen","doi":"10.1109/WISPNET.2016.7566529","DOIUrl":"https://doi.org/10.1109/WISPNET.2016.7566529","url":null,"abstract":"Accuracy in diagnostics of life-threatening disease based on chest x-ray images is an atmost importance in healthcare sector, where medical image processing has already played a contributory role from more than a decade. In this regards, image enhancement plays a critical role in exposing more information to the foreground image of clinical importance. We have reviewed the most existing system pertaining to chest image enhancement and found that more enhancements could be done to enhance the signal quality. Therefore, we present a sophisticated algorithm that performs multiple operations for enhancing the chest x-rays. The proposed paper introduces techniques for enhancing chest x-rays using non-linear enhancement, primary enhancement, secondary enhancement algorithms on JSRT database. The proposed system shows better quality of enhanced region in comparison to the most frequently adopted techniques for medical image enhancement.","PeriodicalId":138911,"journal":{"name":"2016 International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET)","volume":"67 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126266770","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Data compression in Wireless visual Sensor networks using wavelets 基于小波的无线视觉传感器网络数据压缩
S. Sofi, Roohie Naaz
{"title":"Data compression in Wireless visual Sensor networks using wavelets","authors":"S. Sofi, Roohie Naaz","doi":"10.1109/WISPNET.2016.7566344","DOIUrl":"https://doi.org/10.1109/WISPNET.2016.7566344","url":null,"abstract":"Wireless Sensor Networking is a sensor information gathering technology that has a wide range of applications in numerous fields. However due to the fact that sensor nodes have limited battery and are deployed in remote and harsh environments, energy efficient and real time transmission of the information are still open challenges. Since in a wireless sensor network data transmission is the most power consuming task, so far most useful techniques for the purpose of energy efficient and real time transmissions are based on data compression, the majority of them are based on wavelet transform. This paper give performance analysis of different wavelets for energy efficient and real time image data transmission in application like environment monitoring using wireless visual sensor networks. The performance evaluation shows that Haar wavelet is better in terms of energy efficiency and transmission time.","PeriodicalId":138911,"journal":{"name":"2016 International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131517006","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Analysis of simulation tools in cloud computing 云计算仿真工具分析
ASHALATHA RAMEGOWDA, Jayashree Agarkhed, S. Patil
{"title":"Analysis of simulation tools in cloud computing","authors":"ASHALATHA RAMEGOWDA, Jayashree Agarkhed, S. Patil","doi":"10.1109/WISPNET.2016.7566233","DOIUrl":"https://doi.org/10.1109/WISPNET.2016.7566233","url":null,"abstract":"For any large scale cloud applications coming around large geographic distribution, the large requirements have to be evaluated by the developers. Simulation procedures are very much useful for the researchers during their research process. Their own algorithms can be tested in a cloud environment using any type of simulators. Therefore, the common toolsets have to be used for evaluation and modeling for large cloud applications. In this regard, common simulation tools are defined in this paper for large cloud environments which takes care of computing services and user workloads.","PeriodicalId":138911,"journal":{"name":"2016 International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET)","volume":"162 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134243217","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
An energy aware Genetic Algorithm Multipath Distance Vector Protocol for efficient routing 基于能量感知的遗传算法多路径距离矢量协议的高效路由
J. Seetaram, P. S. Kumar
{"title":"An energy aware Genetic Algorithm Multipath Distance Vector Protocol for efficient routing","authors":"J. Seetaram, P. S. Kumar","doi":"10.1109/WISPNET.2016.7566488","DOIUrl":"https://doi.org/10.1109/WISPNET.2016.7566488","url":null,"abstract":"Mobile Adhoc Networks (MANETs) are networks that are dynamic and lacking infrastructure, with a set of wireless mobile nodes transmitting with one another with wireless links. MANET has no central controlling device and has constantly shifting topologies. Routing algorithms have a major part in communicating information over a system. Routing protocols has two noteworthy arrangements are unipath and multipath. The current work assesses execution of an on-demand multipath routing protocol called Adhoc On-demand Multipath Distance Vector (AOMDV) routing. This paper suggests an energy-aware Genetic Algorithm (GA) based Multipath Distance Vector Protocol. GA has been viewed as one of the meta-heuristic strategies created to take care of the optimization issues utilizing the simulation of the conduct of the hereditary operators. Simulation results demonstrate the high accuracy and quality of the suggested technique for the optimization strategies achieved by the GA.","PeriodicalId":138911,"journal":{"name":"2016 International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133555303","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Design of ultra wideband low noise amplifier with the negative feedback using micro strip line matching structure for multiple band application and its simulation based performance analysis 基于微带线匹配结构的多波段负反馈超宽带低噪声放大器设计及其仿真性能分析
Bhushan Vidhale, M. Khanapurkar
{"title":"Design of ultra wideband low noise amplifier with the negative feedback using micro strip line matching structure for multiple band application and its simulation based performance analysis","authors":"Bhushan Vidhale, M. Khanapurkar","doi":"10.1109/WISPNET.2016.7566461","DOIUrl":"https://doi.org/10.1109/WISPNET.2016.7566461","url":null,"abstract":"In this paper we have discussed the design of multiple band low noise amplifier using micro strip lines structure and its simulation based performance analysis. LNA design is very difficult work in the receiver part because the signal which received is very weak and gets affected easily with the noise. Therefore it is necessary that new design must give noise figure as low as possible over a wide range. If LNA works for on wide band so it can be used for multiple band applications. Its simulation based analysis is also important to test its stability and performance before fabrication. As it is difficult to get all the characteristics of LNA perfectly therefore there is always a tradeoff between gain and noise. We have to optimize the values of the component so as to get the optimum results. To achieve this entire component, the negative feedback is used with a matching circuit which consists of micro strip line and some passive elements. The software ADS is used for simulations and to optimize design. The simulation based performance analysis done with variation of temperature. In results we are getting the Gain of LNA up to 30 db with noise figure less than 3 db. Stability that is getting for design LNA is greater than 1 for frequency band of 500 MHz to 6 GHz Design LNA can be used for multiple band applications like GSM, Bluetooth, CDMA,WiFi, WiMax & GPS.","PeriodicalId":138911,"journal":{"name":"2016 International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132395614","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Implementation of coplanar approximate adders in QCA QCA中共面近似加法器的实现
B. Aravinth, L. A. Marcilin
{"title":"Implementation of coplanar approximate adders in QCA","authors":"B. Aravinth, L. A. Marcilin","doi":"10.1109/WISPNET.2016.7566219","DOIUrl":"https://doi.org/10.1109/WISPNET.2016.7566219","url":null,"abstract":"A approximate adder implemented with quantum-dot cellular automata (QCA) is described. The most basic arithmetic process is the adding of two binary digits, i.e. bits. In many fields the adder plays an important role but in most of the field the accuracy is not in concern. So proposed a novel approximate adder of quantum dot cellular automata (QCA).The proposed adder is used to reduce the circuit complexity and time delay with low error rate. The circuit complexity reduction is achieved by reducing the majority gate in the adder circuit. The operation of QCA circuits is simulated and verified using QCA Designer bistable vector simulation.","PeriodicalId":138911,"journal":{"name":"2016 International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125485103","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Enhancing security in MANETS through trust-aware routing 通过信任感知路由增强MANETS的安全性
V. Bhargavi, S. Raju
{"title":"Enhancing security in MANETS through trust-aware routing","authors":"V. Bhargavi, S. Raju","doi":"10.1109/WISPNET.2016.7566481","DOIUrl":"https://doi.org/10.1109/WISPNET.2016.7566481","url":null,"abstract":"A Mobile ad Hoc Network is a collection of nodes which is an infrastructure less network and hence can be easily established and deployed instantly. In addition to their normal operation, all the nodes in this kind of network act as routers as well. Because of the mobility and dynamic nature of the network, all the nodes are free to move randomly and hence topology of a MANET changes very frequently. This invites the complexity of routing the packets from source to destination. Also, as a MANET is a multi-hop network, the packets should pass through intermediate nodes which always need not be genuine all the time which poses many security issues in MANET's. Our paper discusses a secure routing protocol which is a trust based secure routing scheme that considers information collected from neighbouring nodes. Based on the trust information received about a node from its neighbouring nodes and its past history of transactions, we assign a trust value for every node in the network. If this value is less than a specific threshold set by the coordinator nodes, that specific node can be considered as a malicious node and hence routing paths should not involve such nodes, which guarantees secure path routing. This protocol has been implemented on NS-2 and results show that this protocol achieved better performance in terms of the packet delivery ratio and throughput when compared to existing routing schemes in literature.","PeriodicalId":138911,"journal":{"name":"2016 International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130732200","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Survey on the nonlinearity of Boolean functions 布尔函数非线性研究综述
Bharti
{"title":"Survey on the nonlinearity of Boolean functions","authors":"Bharti","doi":"10.1109/WISPNET.2016.7566258","DOIUrl":"https://doi.org/10.1109/WISPNET.2016.7566258","url":null,"abstract":"The symmetric key ciphers namely stream ciphers and block ciphers have a major role of Boolean functions in their construction. This is because they are able to provide ciphers with strengthening properties to resist known and potential cryptanalytic attacks. One of the important cryptographic properties that a strong Boolean function required is nonlinearity. A high value of nonlinearity must be possessed by Boolean functions so as to endure linear and correlation attacks. The study of lower or upper bound of nonlinearity of different types of Boolean functions such as resilient function, Carlet-feng function, MAI function, bent function, Tu-deng function etc. is the main aim of this paper.","PeriodicalId":138911,"journal":{"name":"2016 International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116272747","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Forensic model for cloud computing: An overview 云计算取证模型:概述
M. Edington, Alex, R. Kishore
{"title":"Forensic model for cloud computing: An overview","authors":"M. Edington, Alex, R. Kishore","doi":"10.1109/WISPNET.2016.7566345","DOIUrl":"https://doi.org/10.1109/WISPNET.2016.7566345","url":null,"abstract":"In new digital era, cyber criminals uses cloud computing as their trusted sector for fraudulent activities due to owing characteristics of cloud computing. This makes cloud forensics, a new discipline in digital world. Recent survey [1] reveals that cyber criminals are adopting towards cloud computing technology for their fraudulent activities due to its essential characteristics that brings safe zone for criminals and also due to the lack of suitable digital forensic techniques for cloud environment. As a result of mitigating cloud crime, cloud forensics came up with number of challenges and issues. The objective of this paper is to put importance on the challenges faced by investigators during investigation process. Most of the research work in the literature highlights the challenges in cloud forensics and the projected solutions in literature depends on Cloud Service Provider (CSP) for forensics investigation. The dependence on CSP includes the collection of data for forensics process and there may be a chance of altering data that affects the whole investigation process. For mitigating dependence on CSP we come up with a new model for collecting forensic evidences outside cloud environment.","PeriodicalId":138911,"journal":{"name":"2016 International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET)","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123963976","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信
小红书