2014 International Conference on Communication and Signal Processing最新文献

筛选
英文 中文
A relay selection mechanism using RED factors for cooperative communications in mobile ad-hoc networks 在移动自组织网络中使用RED因子进行协作通信的中继选择机制
2014 International Conference on Communication and Signal Processing Pub Date : 2014-04-03 DOI: 10.1109/ICCSP.2014.6949938
K. Muralidhar, N. Bharathi
{"title":"A relay selection mechanism using RED factors for cooperative communications in mobile ad-hoc networks","authors":"K. Muralidhar, N. Bharathi","doi":"10.1109/ICCSP.2014.6949938","DOIUrl":"https://doi.org/10.1109/ICCSP.2014.6949938","url":null,"abstract":"Cooperative communication uses other communication devices to relay transmission. Relay selection plays a vital in improving the performance of cooperative communication. Some works have been done on relay selection in cooperative communications. This research proposes a new practice for selecting the optimal relay in cooperative communication. The proposed work considers RSSI, residual energy and the distance factors i.e., the “suitability” score is based on the above three measures, which can be used to determine the relay node. Since when the potential relay say x is closer to the destination, the channel quality between them is better, moreover fewer collisions would occur as there are less number of potential relays closer to the destination than x and selecting the node with sufficient residual energy as relay would withstand throughout the duration of retransmission.","PeriodicalId":149965,"journal":{"name":"2014 International Conference on Communication and Signal Processing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2014-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125898624","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Multiscale intuitionistic fuzzy roughness measure for image segmentation 图像分割的多尺度直觉模糊粗糙度度量
2014 International Conference on Communication and Signal Processing Pub Date : 2014-04-03 DOI: 10.1109/ICCSP.2014.6949879
Prajakta R. Nehare, Yogita K. Dubey, M. Mushrif
{"title":"Multiscale intuitionistic fuzzy roughness measure for image segmentation","authors":"Prajakta R. Nehare, Yogita K. Dubey, M. Mushrif","doi":"10.1109/ICCSP.2014.6949879","DOIUrl":"https://doi.org/10.1109/ICCSP.2014.6949879","url":null,"abstract":"In this paper, a method for image segmentation using multiscale intuitionistic fuzzy roughness measure is proposed. The traditional roughness measure tends to over-focus on the little important homogeneous regions but is not accurate enough to measure the homogeneity in an image. By applying the theories of scale-space and using intuitionistic fuzzy representation for images, roughness is measured under multiple scales. Multiscale representation can tolerate the disturbance of trivial regions, and intuitionistic fuzzy representation deals with hesitancy in image boundary, therefore produces precise segmentation results.","PeriodicalId":149965,"journal":{"name":"2014 International Conference on Communication and Signal Processing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2014-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129858112","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Complementary triangular split ring resonator (CTSRR) loaded circularly polarized planar antenna 互补三角形分裂环谐振器加载圆极化平面天线
2014 International Conference on Communication and Signal Processing Pub Date : 2014-04-03 DOI: 10.1109/ICCSP.2014.6949988
Sneha Johnson, J. Mangaiyarkarasi, P. H. Rao
{"title":"Complementary triangular split ring resonator (CTSRR) loaded circularly polarized planar antenna","authors":"Sneha Johnson, J. Mangaiyarkarasi, P. H. Rao","doi":"10.1109/ICCSP.2014.6949988","DOIUrl":"https://doi.org/10.1109/ICCSP.2014.6949988","url":null,"abstract":"A miniaturized dual fed circularly polarized square patch antenna is presented. The miniaturization is accomplished by loading one of the feed lines with a complementary triangular split ring resonator (CTSRR). Phase characteristics of CTSRR are optimized to realize a miniaturized feed line and axial ratio less than 3dB over the band. Proposed configuration exhibits a return loss of 10.5dB, gain of 4.7dB and axial ratio of 2.8dB at 4 GHz. A miniaturization of the order of 50% is achieved using CTSRR loaded configuration when compared to the conventional configuration.","PeriodicalId":149965,"journal":{"name":"2014 International Conference on Communication and Signal Processing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2014-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129314698","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Spoofing attack: Preventing in wireless networks 欺骗攻击:防止在无线网络
2014 International Conference on Communication and Signal Processing Pub Date : 2014-04-03 DOI: 10.1109/ICCSP.2014.6949811
S. Raguvaran
{"title":"Spoofing attack: Preventing in wireless networks","authors":"S. Raguvaran","doi":"10.1109/ICCSP.2014.6949811","DOIUrl":"https://doi.org/10.1109/ICCSP.2014.6949811","url":null,"abstract":"Wireless ad hoc networks are defenceless to uniqueness based assaults because they don't have the centralized server to control the communication nodes in the network, so many attacks like injecting the malicious nodes by adversaries, false identity creation for nodes and also including spoofing attacks, such that drastically collision or reduce the overall routine of wireless networks. Conservatively, make confident the uniqueness of the conversationalist and perceiving an adversarial or attackers presence is executed through cryptographic validation. Unfortunately, verification of the uniqueness or identity is not constantly enviable as it necessitates key service management, and also coupled with extra infrastructural visual projection and more general calculations. So that it has been proposed, which are corresponding to validate and can perceive wireless device spoofing with diminutive or no dependency on cryptographic technique i.e., without using the digital signature. So that we proposed the efficient algorithm to identify the spoofing or mockery of information and these kind of attacks in the wireless networks. There are many techniques proposed previously to tackle the false information injection, Identity theft attacks and IP spoofing in the wireless networks. In order to overcome the obstacles in the previously proposed methods, we implement effective algorithm for the authentication process or verification and filtering of the MAC addresses of the Roger wireless devices. Our proposed method has consisted of two main implementation parts to address the spoofing attacks. One part is to identify the uniqueness of the client address and other is to make the modification access point control list in each client. Through our proposed technique, recognize of spoofing or mockery of information attacks in wireless networks in the effective way and also helps to identify the adversaries using same uniqueness of the nodes in the wireless networks. Our proposed model can be explored added to get better the accuracy of determining the attacks in the wireless networks, by using non cryptographic technique when compared to others. Our proposed scheme works effectively when compared to the previous system is shown through our implementation and results.","PeriodicalId":149965,"journal":{"name":"2014 International Conference on Communication and Signal Processing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2014-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129693220","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Non-linear adaptive echo supression algorithms: A technical survey 非线性自适应回波抑制算法:技术综述
2014 International Conference on Communication and Signal Processing Pub Date : 2014-04-03 DOI: 10.1109/ICCSP.2014.6949802
B. Panda, Asutosh Kar, M. Chandra
{"title":"Non-linear adaptive echo supression algorithms: A technical survey","authors":"B. Panda, Asutosh Kar, M. Chandra","doi":"10.1109/ICCSP.2014.6949802","DOIUrl":"https://doi.org/10.1109/ICCSP.2014.6949802","url":null,"abstract":"Voice communication today has become an indispensable part of human lives. Long distance communication is as crucial as face to face conversation. Hence, the issue of speech quality needs to be addressed with utmost priority. In this paper, the importance of voice communication over long distance is discussed. Then the analysis proceeds with the thorough study of an acoustic environment with the presence of acoustic echo in the scenario. Subsequently, the nonlinear acoustic echo is studied along with the difficulties that need to be tackled with to ensure its effective cancellation without causing harm to the significant voice data that need to be transmitted. Finally, various methods to find the non-linearity are presented with the thorough comparison of the existing nonlinear acoustic echo cancellation algorithms.","PeriodicalId":149965,"journal":{"name":"2014 International Conference on Communication and Signal Processing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2014-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128015672","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Performance analysis of adaptive maximal ratio/ selection combining based on full CSI and maximum flow constraint 基于全CSI和最大流量约束的自适应最大比值/选择组合性能分析
2014 International Conference on Communication and Signal Processing Pub Date : 2014-04-03 DOI: 10.1109/ICCSP.2014.6950148
S. Muthukumar, V. Nagarajan
{"title":"Performance analysis of adaptive maximal ratio/ selection combining based on full CSI and maximum flow constraint","authors":"S. Muthukumar, V. Nagarajan","doi":"10.1109/ICCSP.2014.6950148","DOIUrl":"https://doi.org/10.1109/ICCSP.2014.6950148","url":null,"abstract":"Cooperative diversity effectively mitigates the fading effect in wireless communication. The system with a source, a destination and the multiple relays is considered for performance analysis. The relay with best channel conditions perform the Decode and Forward (DF) relaying in distributed manner. Then the receiver combines the received signal with the full Channel State Information (CSI) using Maximum Ratio Combining (MRC) for the received instantaneous Signal to Noise Ratio (SNR) of source-relay channel greater than the SNR of relay-destination channel, otherwise Selection Combining (SC) is used to select the channel with maximum SNR. The end-to-end Symbol Error Probability (SEP) with DF relaying for QPSK symbol using proposed combining techniques is derived in closed form, the results shows proposed adaptive combining has better performance than the conventional cooperation scheme.","PeriodicalId":149965,"journal":{"name":"2014 International Conference on Communication and Signal Processing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2014-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124605918","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Implementation of low power flash ADC by reducing comparators 通过减少比较器实现低功耗闪存ADC
2014 International Conference on Communication and Signal Processing Pub Date : 2014-04-03 DOI: 10.1109/ICCSP.2014.6949880
R. Megha, K. A. Pradeepkumar
{"title":"Implementation of low power flash ADC by reducing comparators","authors":"R. Megha, K. A. Pradeepkumar","doi":"10.1109/ICCSP.2014.6949880","DOIUrl":"https://doi.org/10.1109/ICCSP.2014.6949880","url":null,"abstract":"The need for a high speed and low power ADC is very essential for various applications. Flash ADCs are always the architecture choice where maximum sample rate and moderate resolution is needed. Even though flash ADC is the fastest type available it takes enormous amount of IC real estate to implement. The main disadvantage of flash ADC is that it need large area and dissipate large amount of power. To overcome this complexity number of comparators are reducing by using multiplexers. Here the multiplexers are used to generate reference voltages. A 4-bit CMOS based flash ADC is presenting, which uses reduced comparator and multiplexer based architecture. Here both the analog and the digital parts of the proposed ADC are completely modified. This architecture uses only 4 comparators for a 4 bit ADC. This 4-bit ADC is designed and simulated in Hspice with 1.2 V supply voltage.","PeriodicalId":149965,"journal":{"name":"2014 International Conference on Communication and Signal Processing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2014-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130158454","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Performance analysis of impulse noise removal using cloud algorithm 基于云算法的脉冲噪声去除性能分析
2014 International Conference on Communication and Signal Processing Pub Date : 2014-04-03 DOI: 10.1109/ICCSP.2014.6949768
S. Surendhar, P. Thirumurugan, S. Sasikumar
{"title":"Performance analysis of impulse noise removal using cloud algorithm","authors":"S. Surendhar, P. Thirumurugan, S. Sasikumar","doi":"10.1109/ICCSP.2014.6949768","DOIUrl":"https://doi.org/10.1109/ICCSP.2014.6949768","url":null,"abstract":"In this paper, a novel switching mean filter using cloud algorithm method is proposed, which is a powerful impulse noise removal method. We employ an efficient impulse noise detector to detect the noisy pixels and proposed cloud impulse noise removal algorithm to reconstruct the intensity value of noise pixels. Extensive experimental results demonstrate that our method can obtain better performances in terms of both subjective and objective evaluations than those state-of-the-art impulse denoising techniques. Especially, the proposed method can preserve edges very well while removing impulse noise. Since our algorithm is simple, it is very suitable to be applied to real-time applications.","PeriodicalId":149965,"journal":{"name":"2014 International Conference on Communication and Signal Processing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2014-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128910523","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Design of Trellis code modulation decoder using Hybrid Register Exchange Method 基于混合寄存器交换法的栅格码调制解码器设计
2014 International Conference on Communication and Signal Processing Pub Date : 2014-04-03 DOI: 10.1109/ICCSP.2014.6949842
T. Panse, Kshitij Saratkar
{"title":"Design of Trellis code modulation decoder using Hybrid Register Exchange Method","authors":"T. Panse, Kshitij Saratkar","doi":"10.1109/ICCSP.2014.6949842","DOIUrl":"https://doi.org/10.1109/ICCSP.2014.6949842","url":null,"abstract":"This paper presents the technique for designing the area efficient trellis code modulation encoder and decoder. One of the best encoding techniques is convolutional encoding as convolutional encoding improves the error performance of communicational channel. The trellis code modulation (TCM) can achieve the better error performance without Bandwidth expansion. Viterbi decoder is use in Trellis code modulation, to decode a data which is encoded by a convolutional encoder. Here TCM encoder and decoder are designed by using Xilinx ISE 13.2 design software and device use is Spartan 6. Proposed technique is aims to reduce the hardware requires for designing the TCM decoder by using hybrid register exchange method. Hybrid register exchange method (HREM) is a combination of the register exchange method (REM) and Traceback (TB) technique. HREM is superior as compared to Register Exchange Method (REM) and Traceback method (TB), where area requires for designing of survivor memory unit is more as compare to the proposed technique.","PeriodicalId":149965,"journal":{"name":"2014 International Conference on Communication and Signal Processing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2014-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121675262","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
FPGA implementation of MIMO-OFDM transceiver MIMO-OFDM收发器的FPGA实现
2014 International Conference on Communication and Signal Processing Pub Date : 2014-04-03 DOI: 10.1109/ICCSP.2014.6949861
K. Srinandhini, V. Vaithianathan
{"title":"FPGA implementation of MIMO-OFDM transceiver","authors":"K. Srinandhini, V. Vaithianathan","doi":"10.1109/ICCSP.2014.6949861","DOIUrl":"https://doi.org/10.1109/ICCSP.2014.6949861","url":null,"abstract":"Orthogonal Frequency Division Multiplexing (OFDM) which is a FDM modulation is a promising methodology for high data rate applications like video streaming. This methodology works effectively for multipath frequency selective channels. Multiple Input and Multiple Output (MIMO) is a wireless technology that uses multiple antennas at the transceiver ends. It increases link throughput and network capacity. The combination of both MIMO and OFDM provides a system that is robust against the frequency-selective fading caused by sever multi-path scattering and narrowband interference. This ongoing evaluation has accelerated the development of System-on-chip (SoC) platform to support the physical layer of these technologies. In this paper, Field Programmable Gate Array (FPGA) implementation of channel coder, its decoder, interleaver and deinterleaver of MIMO-OFDM are discussed. Convolutional encoder of code rate 1/2 is used because of its less complexity and Viterbi decoder is used for decoding. Interleaver and Deinterleaver is used to remove the burst error thus improving the performance.","PeriodicalId":149965,"journal":{"name":"2014 International Conference on Communication and Signal Processing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2014-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116206770","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信