2014 International Conference on Communication and Signal Processing最新文献

筛选
英文 中文
Analysis of lung diseases and detecting deformities in human lung by classifying lung sounds 通过肺音分类分析肺部疾病及检测人体肺部畸形
2014 International Conference on Communication and Signal Processing Pub Date : 2014-04-03 DOI: 10.1109/ICCSP.2014.6950009
Jayant Mankar, P. Malviya
{"title":"Analysis of lung diseases and detecting deformities in human lung by classifying lung sounds","authors":"Jayant Mankar, P. Malviya","doi":"10.1109/ICCSP.2014.6950009","DOIUrl":"https://doi.org/10.1109/ICCSP.2014.6950009","url":null,"abstract":"To analyze lung sound by auscultation method requires substantial clinical experience, a fine stethoscope and good listening skills. The lung itself cannot generate sound if there is no airflow; pressure differences between structures within the thorax. The type of lung sound can be known by listening to the lung sound. The timing, repeatability and shape of crackles are important parameter for diagnosis. In this paper, we aim to detect and classify crackle to find deformities in lungs.","PeriodicalId":149965,"journal":{"name":"2014 International Conference on Communication and Signal Processing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2014-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127721011","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
A technical review on adaptive algorithms for acoustic echo cancellation 回声消除自适应算法研究进展
2014 International Conference on Communication and Signal Processing Pub Date : 2014-04-03 DOI: 10.1109/ICCSP.2014.6949795
Abhishek Deb, Asutosh Kar, M. Chandra
{"title":"A technical review on adaptive algorithms for acoustic echo cancellation","authors":"Abhishek Deb, Asutosh Kar, M. Chandra","doi":"10.1109/ICCSP.2014.6949795","DOIUrl":"https://doi.org/10.1109/ICCSP.2014.6949795","url":null,"abstract":"Acoustic echo is one of the most important issues in communication. It creates disturbance in day-to-day communication. This echo can be cancelled using adaptive filters which are governed by adaptive algorithms. Right from the introduction of Least Mean Square (LMS) algorithm, over the years, a lot of research has been done in this field in order to develop new algorithms which can effectively drive the filter to give better performance. In this review paper, we have studied and discussed all the previous work done on these algorithms in relation to acoustic echo cancellation. This paper contains the basic review of all such existing algorithms as well as their merits and demerits. It covers the basic algorithms like LMS algorithm, Recursive Least Square algorithm as well as their modified versions like Normalized Least Mean Square algorithm, Fractional Least Mean Square algorithm, Filtered-x Least Mean Square algorithm etc. Finally, a tabular comparison has been given towards the end of the paper in order to conclude the discussion.","PeriodicalId":149965,"journal":{"name":"2014 International Conference on Communication and Signal Processing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2014-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132671718","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 24
Performance analysis of proposed mobile autonomous agent for detection of malicious node and protecting against attacks in MANET 基于移动自治代理的MANET恶意节点检测与攻击防护性能分析
2014 International Conference on Communication and Signal Processing Pub Date : 2014-04-03 DOI: 10.1109/ICCSP.2014.6950182
T. Stephen John, A. Aranganathan
{"title":"Performance analysis of proposed mobile autonomous agent for detection of malicious node and protecting against attacks in MANET","authors":"T. Stephen John, A. Aranganathan","doi":"10.1109/ICCSP.2014.6950182","DOIUrl":"https://doi.org/10.1109/ICCSP.2014.6950182","url":null,"abstract":"Routing in mobile ad hoc network (MANETs) for groups should aim at providing reliable and robust multicast routes to the group members against link and node failures with mobility conditions. This paper propose an agent-based multicast routing scheme like On-Demand Multicast Routing Protocol (ODMRP) which can be more suitable for Ad Hoc network but D-ODMRP Destination driven On-Demand Multicast Routing Protocol is used to reduce the number of nodes to be added in the forwarding group. D-ODMRP introduces the features into the existing on demand process of multicast forwarding structure in MANET that builds a backbone in the form of a reliable mesh and finds multicast routes. Mobile autonomous agent technique for intrusion detection system in MANET has been proposed where agents are fired from a source node which traverses each node randomly and detect the malicious node. The link failure are detected and repaired by nearby nodes. This paper illustrate three types of performance analysis they are packet delivery ratio against number of multicast group, power consumption of nodes verses number of nodes & network area verses no of nodes and found that proposed system is better.","PeriodicalId":149965,"journal":{"name":"2014 International Conference on Communication and Signal Processing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2014-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133122689","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Adaptive Energy aware reputation based leader election for IDS in MANET 基于自适应能量感知声誉的MANET IDS领导人选举
2014 International Conference on Communication and Signal Processing Pub Date : 2014-04-03 DOI: 10.1109/ICCSP.2014.6949972
Santoshkumar Sabat, Sujata V. Kadam
{"title":"Adaptive Energy aware reputation based leader election for IDS in MANET","authors":"Santoshkumar Sabat, Sujata V. Kadam","doi":"10.1109/ICCSP.2014.6949972","DOIUrl":"https://doi.org/10.1109/ICCSP.2014.6949972","url":null,"abstract":"we have proposed an Energy efficient leader election in MANET for Intrusion detection service (IDS). As MANET don't have any centralized controller, the leader election in each cluster becomes very important. The purpose of the elected leader is to serve the IDS for the entire cluster. Our leader election is based on Reputation value and energy level of each node. We have simulated in NS2 environment and shown the comparison of energy consumption or Residual energy of nodes having fixed transmission range with the proposed adaptive energy scheme. Adaptive energy scheme adjusts the range of transmission of each node based on the maximum distance between nodes in each cluster. Energy of each node is conserved as compared to node having fixed transmission range. Thus the leader can serve the cluster for longer duration of life, increasing the percentage of alive nodes, conserving energy of node.","PeriodicalId":149965,"journal":{"name":"2014 International Conference on Communication and Signal Processing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2014-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132352686","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Privacy preservation algorithm in data mining for CRM systems CRM系统数据挖掘中的隐私保护算法
2014 International Conference on Communication and Signal Processing Pub Date : 2014-04-03 DOI: 10.1109/ICCSP.2014.6950121
Shashidhar Virupaksha, G. Sahoo, A. Vasudevan
{"title":"Privacy preservation algorithm in data mining for CRM systems","authors":"Shashidhar Virupaksha, G. Sahoo, A. Vasudevan","doi":"10.1109/ICCSP.2014.6950121","DOIUrl":"https://doi.org/10.1109/ICCSP.2014.6950121","url":null,"abstract":"Organizations have a huge customer base and thus they use data mining tools to study their customers. However there is risk of sensitive information about individuals which can be gained also during this process. Hence data that is used for data mining has to be protected. There are some privacy protection algorithms which ensure privacy and protect data. These algorithms preserve privacy but data mining results significantly. In this paper we propose a clustering based noise addition that not only preserves privacy but also ensures effective data mining. Data characteristics are identified using clustering technique and noise is added within the clusters thus retaining the data characteristics.","PeriodicalId":149965,"journal":{"name":"2014 International Conference on Communication and Signal Processing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2014-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115346478","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Blend of error control codes in OFDM - effect of channel - a comparative approach OFDM中差错控制码的混合——信道的影响——一种比较方法
2014 International Conference on Communication and Signal Processing Pub Date : 2014-04-03 DOI: 10.1109/ICCSP.2014.6949833
P. Praveenkumar, K. Thenmozhi, J. Alfaaz Zami, Rengarajan Amirtharajan
{"title":"Blend of error control codes in OFDM - effect of channel - a comparative approach","authors":"P. Praveenkumar, K. Thenmozhi, J. Alfaaz Zami, Rengarajan Amirtharajan","doi":"10.1109/ICCSP.2014.6949833","DOIUrl":"https://doi.org/10.1109/ICCSP.2014.6949833","url":null,"abstract":"Role of modern day technology in business world is very imperative and moving. Be it collaboration, telephony, social media etc. in a particular trade, ultimately, information is what being communed. Its importance is more studied and explored in the domain of Business communication. At the same time, emphasis is greatly laid to have secure communication between the parties irrespective of the medium of communication. This is where software and cryptic techniques come into help. Information security plays a crucial role in safeguarding the message or information involved in the communication. Nowadays, right from small vendors to corporate giants, every business organization relies directly or indirectly on cryptic experts for the same. This work is one such blend of technology and security for data protection. This paper deals with the comparative performance analysis of different modulation schemes like BPSK, QPSK, 8QAM, 16QAM, 32QAM and 64 QAM using concatenated Error Control Codes (ECC) in OFDM(Orthogonal Frequency Division Multiplexing). RS(Reed Solomon) codes with Convolutional codes has been used as the concatenated error control code. Then the coded data bits are encrypted to the enhance copy right protection. BER Vs Eb/No graphs are plotted using various modulation schemes adopting AWGN (Additive White Gaussian Noise channel), Rayleigh and Rician Fading Channels. Correlation values are computed for various inner and outer code rates to validate the encryption operation.","PeriodicalId":149965,"journal":{"name":"2014 International Conference on Communication and Signal Processing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2014-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115602710","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Design of 50–75 GHz V-band low power and high gain down-conversion mixer 50 - 75ghz v波段低功率高增益下变频混频器的设计
2014 International Conference on Communication and Signal Processing Pub Date : 2014-04-03 DOI: 10.1109/ICCSP.2014.6950123
K. Suriya, G. Durga
{"title":"Design of 50–75 GHz V-band low power and high gain down-conversion mixer","authors":"K. Suriya, G. Durga","doi":"10.1109/ICCSP.2014.6950123","DOIUrl":"https://doi.org/10.1109/ICCSP.2014.6950123","url":null,"abstract":"This paper presents the design of V-band low power down-conversion mixer operating in weak inversion biasing region using 90-nm CMOS technology. The mixer exhibits a double-balanced Gilbert cell structure in source-driven topology with RF signal applied at the gate and local oscillator (LO) signal at the source. It achieves high conversion gain of 7.297 dB at RF signal of 60 GHz at standard supply voltage of 1.2 V. Other performance parameters measured are LO-to-RF port isolation as more than 40 dB, the third-order input intercept point (IIP3) as -1.692 dBm, OP1dB as -7.382 dBm and DC power consumption of 548 μW at LO power of -6 dBm indicates that this mixer is suitable for low power millimeter-wave (MMW) radio applications. The mixer is designed and simulated using Agilent's Advanced Design System (ADS).","PeriodicalId":149965,"journal":{"name":"2014 International Conference on Communication and Signal Processing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2014-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115738055","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A node authentication clustering based security for ADHOC network 基于节点认证集群的ADHOC网络安全
2014 International Conference on Communication and Signal Processing Pub Date : 2014-04-03 DOI: 10.1109/ICCSP.2014.6950038
Rajamanickam Murugesan, M. Saravanan, Mariappan Vijyaraj
{"title":"A node authentication clustering based security for ADHOC network","authors":"Rajamanickam Murugesan, M. Saravanan, Mariappan Vijyaraj","doi":"10.1109/ICCSP.2014.6950038","DOIUrl":"https://doi.org/10.1109/ICCSP.2014.6950038","url":null,"abstract":"The exodus to Wireless networks from wired network is a growing field in the past few decades. Various wireless applications are made up of mobility and scalability based nodes. Among all the wireless networks Mobile Ad-Hoc network is one of the most significant and distinctive applications today. All the nodes are self employed, not fixed on a fixed network infrastructure, and it can act as sender as well as receiver, and directly communicate to the other nodes in the network within the communication range of the network. Also the nodes in the Wireless network can act as relay nodes to their neighbors to relay messages. Since the nodes in the Wireless Network having the ability to self-configuring by them, they are deployed in critical mission based applications like military usage or any kind of emergency recovery. Since the open medium and wide distribution of nodes make the network vulnerable to malicious attackers. In such situations, it is necessary to deploy an effective IDS mechanism to prevent or protect the Network from attacks. In the existing system EAACK - [Enhanced Adaptive Acknowledgement] is proposed as an IDS and it especially designed for MANET. In this paper a combined IP-trace back with E2AACK - [End-to-End Adaptive Acknowledgment] mechanism is proposed to detect and prevent the malicious nodes in the network. The malicious node activity can be detected by IP-trace back and prevented by getting acknowledgement from both end nodes. The simulation result shows that the E2AACK approach provides higher detection rate and prevention which greatly affect the network performance in terms of throughput and delay.","PeriodicalId":149965,"journal":{"name":"2014 International Conference on Communication and Signal Processing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2014-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116283816","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Design and implementation of a Radio on visible light system for indoor communication 一种室内通信可见光无线电系统的设计与实现
2014 International Conference on Communication and Signal Processing Pub Date : 2014-04-03 DOI: 10.1109/ICCSP.2014.6949814
A. Devi, S. Prince
{"title":"Design and implementation of a Radio on visible light system for indoor communication","authors":"A. Devi, S. Prince","doi":"10.1109/ICCSP.2014.6949814","DOIUrl":"https://doi.org/10.1109/ICCSP.2014.6949814","url":null,"abstract":"Visible light communication is a data communication medium, uses the light spectrum between 390nm-700nm. LEDs are used for data transmission along with illumination purpose in visible light communication (VLC). LEDs can easily switch ON and OFF with logical `1' & `0' and data can be sent serially. There are many areas where we can implement VLC but one of the promising stretches that could possibly revolutionize the telecommunication industry is deployment of optical wireless in GSM system. Because of the restriction of Radio Frequency (RF) in some places like hospitals, airplane, petrol stations etc. VLC can be used as an alternative solution for those. The main aim of this project is to design and analyses the optical wireless system to provide connectivity to users in low restricted RF region. A prototype model of the Radio on visible light (RoVL) is proposed to be developed and tested.","PeriodicalId":149965,"journal":{"name":"2014 International Conference on Communication and Signal Processing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2014-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115112746","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Comparative analysis of windowing techniques in minimizing side lobes in an antenna array 最小化天线阵列侧瓣的加窗技术的比较分析
2014 International Conference on Communication and Signal Processing Pub Date : 2014-04-03 DOI: 10.1109/ICCSP.2014.6950075
Teja Mvsr, Ajith Kumar, C. V. Sai Prasanth
{"title":"Comparative analysis of windowing techniques in minimizing side lobes in an antenna array","authors":"Teja Mvsr, Ajith Kumar, C. V. Sai Prasanth","doi":"10.1109/ICCSP.2014.6950075","DOIUrl":"https://doi.org/10.1109/ICCSP.2014.6950075","url":null,"abstract":"Heavy amount of research is being done to reduce side lobes in antennas radiation pattern. Many novel techniques have been adopted in this pursuit. One such technique playing pivotal role in reducing side lobes is windowing techniques. The main emphasis of this paper lies on evaluation and comparison of different windowing techniques efficiency in reducing side lobes of an end-fire array. The windowing techniques chosen for comparison are Bartlett window, Hamming window, Hanning window, Blackman Harris window. The number of elements in array are eight and sixteen respectively. Finally we compared the performance of every window in terms of side lobes level (SLL) and generated polar plots and radiation patterns for each window. Hence we found out that performance of Blackman Harris window is very good and it is a very good general purpose window, having good side lobe rejection and having a moderately wide main lobe.","PeriodicalId":149965,"journal":{"name":"2014 International Conference on Communication and Signal Processing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2014-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123131133","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信