2011 International Conference on Electronics, Communication and Computing Technologies最新文献

筛选
英文 中文
Security enhancement for MIMO based wireless network using codebook and diversity multiplexing 利用码本和分集复用技术增强MIMO无线网络的安全性
R. Raicheal, C. Arunachalaperumal
{"title":"Security enhancement for MIMO based wireless network using codebook and diversity multiplexing","authors":"R. Raicheal, C. Arunachalaperumal","doi":"10.1109/ICECCT.2011.6077079","DOIUrl":"https://doi.org/10.1109/ICECCT.2011.6077079","url":null,"abstract":"In this paper we study about the secure communication among wireless shared medium using secrecy performance of a codebook based transmission beamforming with limited feedback. And avoid attacker from stealing the confidential data. In the feedback method transmitter is using a predefined codebook known to transmitter and receiver knows it after producing index value as feedback during beamforming. The secrecy outage probability is analyzed to find whether it is stealed. The bound values are provided on the secrecy outage probability. The fading in multiple antenna (MIMO) wire-tap channel is investigated under short term power constraints. The secret diversity multiplexing tradeoff (DMT) is found for no transmitter side channel state information (CSI) and for full CSI. When there is no CSI at the transmitter, while using Gaussian codebooks, it seems that both transmitter and receiver antennas are stealed, and the secret DMT depends on the other degrees of freedom. When CSI is available at the transmitter (CSIT), then transmitter antenna is only stealed.","PeriodicalId":158960,"journal":{"name":"2011 International Conference on Electronics, Communication and Computing Technologies","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-11-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122546950","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Pseudo-orthogonal signature sequences for fiber optic CDMA LAN 光纤CDMA局域网的伪正交签名序列
B. Pakiaraj, M. Baladjy, R. Divya
{"title":"Pseudo-orthogonal signature sequences for fiber optic CDMA LAN","authors":"B. Pakiaraj, M. Baladjy, R. Divya","doi":"10.1109/ICECCT.2011.6077078","DOIUrl":"https://doi.org/10.1109/ICECCT.2011.6077078","url":null,"abstract":"In this paper the bit-error rate performances using Gaussian approximation technique and pseudo-orthogonal prime sequence code with a modified prime sequence code using the elements of Galoi's Field for a particular prime number have been developed. The capacities of the prime sequence codes are determined. Detailed simulation results shows the performance of the codes. The codes are useful for medium access in fiber optic CDMA LAN.","PeriodicalId":158960,"journal":{"name":"2011 International Conference on Electronics, Communication and Computing Technologies","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-11-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121518948","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Automation of Supply Chain Management in Rourkela steel plant 鲁克拉钢铁厂供应链管理自动化
R. Panigrahy, S. Pattnaik, N. G. P. C. Mahallick, A. Panda
{"title":"Automation of Supply Chain Management in Rourkela steel plant","authors":"R. Panigrahy, S. Pattnaik, N. G. P. C. Mahallick, A. Panda","doi":"10.1109/ICECCT.2011.6077063","DOIUrl":"https://doi.org/10.1109/ICECCT.2011.6077063","url":null,"abstract":"This paper discusses the implementation of automated Supply Chain Management (SCM) in Rourkela steel plant. This paper covers the model of a SCM, highlight the complexity in Supply Chain Management. Finally this paper will suggest implementation of RFID technology at Rourkela Steel Plant to improve the existing logistic in transportation system and identification of items.","PeriodicalId":158960,"journal":{"name":"2011 International Conference on Electronics, Communication and Computing Technologies","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-11-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130001512","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Design & implementation of ARM based data acquisition system 基于ARM的数据采集系统的设计与实现
Mahboob Imran Shaik
{"title":"Design & implementation of ARM based data acquisition system","authors":"Mahboob Imran Shaik","doi":"10.1109/ICECCT.2011.6077066","DOIUrl":"https://doi.org/10.1109/ICECCT.2011.6077066","url":null,"abstract":"The Rapid development of technologies in the field of electronics has brought tremendous changes in every walk of human life without being limited to any particular field. Starting with many transistors and other electronic components to embedding of large number of transistors along with in numerable other electronic components in a single chip, that too in a compact single chip, with the properties of diverse/ different functions. And these developments in electronics have also entered the ever growing field of industrial processes, viz., optimization of production, safety related aspects etc. The Design & Implementation of ARM Based Data Acquisition System presented here is an intelligent remote unit based on embedded technology for data acquisition, monitoring and output control. This system is very much compact in design, as it uses a highly integrated 32-bit RISC microcontroller along with serial A/D and D/A converters. This Device has high performance and offers the widest range of features viz., flexibility, reliability, durability, when compared with conventional and old solutions to control and data acquisition. The capabilities of input and output are expandable to maximize the functions of the system and also can be used for different applications in real time environment to control and data acquisition. Besides being a single stand-alone system, the tasks like the control, supervision, data acquisition can even be accomplished through Ethernet within the local area network (LAN) of an industrial area.","PeriodicalId":158960,"journal":{"name":"2011 International Conference on Electronics, Communication and Computing Technologies","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-11-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134627935","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
A temporal table authenticated routing protocol for adhoc networks 临时表认证路由协议用于自组织网络
R. Sudha, S. Lecturer, D. Sivakumar
{"title":"A temporal table authenticated routing protocol for adhoc networks","authors":"R. Sudha, S. Lecturer, D. Sivakumar","doi":"10.1109/ICECCT.2011.6077060","DOIUrl":"https://doi.org/10.1109/ICECCT.2011.6077060","url":null,"abstract":"Mobile Ad Hoc Network (MANET) is collection of multi-hop wireless mobile nodes that communicate with each other without centralized control or established infrastructure. The wireless links in this network are highly error prone and can go down frequently due to mobility of nodes, interference and less infrastructure. Therefore, routing in MANET is a critical task due to highly dynamic environment. In recent years, several routing protocols have been proposed for mobile ad hoc networks and prominent among them are DSR, AODV and TORA However, the majority of these MANET secure routing protocols did not provide a complete solution for all the MANETs' attacks and assumed that any node participating in the MANET is not selfish and that it will cooperate to support different network functionalities Much work is going on to provide security to the network. One of the solution to the problem is ARAN — (Authenticated routing protocol) which is a secure protocol and provides Integrity, availability, Confidentiality, Authenticity, Non repudiation, Authorization & Anonymity but an authenticated selfish node can infer to this protocol performance and can disturb the network by dropping packets. This paper discusses Temporal table based schemes that can be applied to ARAN to detect selfish node and improve the performance.","PeriodicalId":158960,"journal":{"name":"2011 International Conference on Electronics, Communication and Computing Technologies","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-11-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124124952","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Modelling and performance analysis of PID power system stabilizer using adaptation law in Simulink environment Simulink环境下基于自适应律的PID电力系统稳定器建模与性能分析
K. Gowrishankar
{"title":"Modelling and performance analysis of PID power system stabilizer using adaptation law in Simulink environment","authors":"K. Gowrishankar","doi":"10.1109/ICECCT.2011.6077075","DOIUrl":"https://doi.org/10.1109/ICECCT.2011.6077075","url":null,"abstract":"In this paper, a self tuning Proportional Integral Derivative (PID) with PSS controller is presented for improving stability of a system in simulink environment. The development of a PID with power system stabilizer in order to maintain stability and enhance the performance of a power system is described widely. The application of the PID with PSS controller is investigated by means of simulation studies on a single machine infinite bus system. The functional blocks of PID with PSS are developed in Simulink and simulation studies are carried out. A study case for the validation of the proposed simulink mechanism is presented and analysed with control application for a synchronous generator excitation system. The superior performance of this stabilizer in comparison to PSS proves the efficiency of this new PID with PSS controller. The comparison studies carried out for various results such as speed deviation, field voltage, rotor angle and load angle in Simulink based MATLAB environment.","PeriodicalId":158960,"journal":{"name":"2011 International Conference on Electronics, Communication and Computing Technologies","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-11-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129440052","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
An efficient data replication method for data access applications in vehicular ad-hoc networks 车载自组织网络中数据访问应用的一种高效数据复制方法
M. Akila, T. Iswarya
{"title":"An efficient data replication method for data access applications in vehicular ad-hoc networks","authors":"M. Akila, T. Iswarya","doi":"10.1109/ICECCT.2011.6077062","DOIUrl":"https://doi.org/10.1109/ICECCT.2011.6077062","url":null,"abstract":"Due to the high vehicle mobility, the topology of vehicular ad hoc networks (VANETs) dynamically changes, and disconnections may frequently occur. When two vehicles are disconnected, they are not able to access data from each other. Data replication has been widely used to reduce the effect of intermittent connectivity and improve data access performance in distributed systems. However, many nodes in VANET may only have limited storage space, and thus cannot replicate all the data such as large music files or video clips. To address this problem, we propose an efficient data replication method for data access applications in VANETs. In this method the vehicles are grouped into a platoon and they contribute part of their buffers to replicate data for others in the same platoon and share data with them. When a vehicle leaves the platoon, it prefetches interested data and transfers its buffered data to other vehicles in advance so that they can still access the data after it leaves. We implement this algorithm in NS-2 and GrooveNet Simulators. The GroveNet Simulator is used to generate the vehicle mobility trace file, which is used in the ns-2 simulations. Extensive simulation results show that this method provides high data availability, low data access overhead, and low false alarm rate.","PeriodicalId":158960,"journal":{"name":"2011 International Conference on Electronics, Communication and Computing Technologies","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-11-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129703333","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Security layers and reliable communications towards green computing 面向绿色计算的安全层和可靠通信
T. Narasimmalou, G. Appasami
{"title":"Security layers and reliable communications towards green computing","authors":"T. Narasimmalou, G. Appasami","doi":"10.1109/ICECCT.2011.6077080","DOIUrl":"https://doi.org/10.1109/ICECCT.2011.6077080","url":null,"abstract":"Green computing is one of the emerging computing technologies to provide Green environment. It is mainly used to protect environment, optimize energy consumption and keeps green environment. Green computing also refers to environmentally energy sustainable computing. Modern world needs Secured and reliable data in unsecured communications. Energy efficient usage, Optimum resource allocation and dynamic routing help for green computing. The intelligent machines collaborative decisions and information sharing without direct human intervention is one Machine point to another machine point communication. In this paper we discussed secured and reliable point to point communications towards green computing.","PeriodicalId":158960,"journal":{"name":"2011 International Conference on Electronics, Communication and Computing Technologies","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-11-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129242809","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Investigation and management solution for privacy identification and electrical energy theft 隐私识别与电能盗窃调查管理解决方案
A. Kannan, A. Krishnan, S. Krishnan, K. V. Bindu, B. Justus Rabi
{"title":"Investigation and management solution for privacy identification and electrical energy theft","authors":"A. Kannan, A. Krishnan, S. Krishnan, K. V. Bindu, B. Justus Rabi","doi":"10.1109/ICECCT.2011.6077073","DOIUrl":"https://doi.org/10.1109/ICECCT.2011.6077073","url":null,"abstract":"This paper discusses a system to determine the identification request for a given person already exists. The check is performed by comparing Applicant attributes (except for signature) against the registration database. For biometric information searches, a Biometric Identification System (BIS), which is an Automated Fingerprint Identification System (AFIS) Database, is searched against the captured biometric data on the application record. If a matched record already exists or a number of partially matched records exist, then application processing is routed to the “Resolve Duplicate” process. The Fraud Investigation application is built on Privacy Identification and Management Solutions (PRIMS) framework which is based on Identification and Credentialing solutions. The solutions are structured to capture biographic and biometric data in real-time with immediate checks on a person's identity, and produce e-ID cards and passports using this framework. The PRIMS framework supports identity management such as personnel enrolment and application processing, identity verification, secure document production and card inventory control, issuance and post-issuance management, authentication /authorization at point-of-service. The PRIMS framework is built with a flexible, component-based, service-oriented architecture. The PRIMS framework integrates a number of functions required to manage end-to-end life cycle of registered persons and secure documents. PRIMS provides a highly configurable workflow and business rules engine and allows for significant variability to support unique client requirements in the areas of enrolment processing, different technologies for secure documents, and different solutions and uses of biometrics.","PeriodicalId":158960,"journal":{"name":"2011 International Conference on Electronics, Communication and Computing Technologies","volume":"333 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-11-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131253272","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Fault tolerant wireless sensor network for remote data acquisition 用于远程数据采集的容错无线传感器网络
R. K. Mugelan, M. Alsath, V. Yokesh
{"title":"Fault tolerant wireless sensor network for remote data acquisition","authors":"R. K. Mugelan, M. Alsath, V. Yokesh","doi":"10.1109/ICECCT.2011.6077072","DOIUrl":"https://doi.org/10.1109/ICECCT.2011.6077072","url":null,"abstract":"This paper enables the personnel to monitor and acquire data from hazardous environments where the human inspection is difficult. The wireless sensor motes are developed for measuring the real-time parameters like temperature, humidity, pressure etc. Further ZigBee protocol has been utilized to enable Inter networking of sensor motes which allows the personnel to aggregate data which makes the available data more reliable. The data sensed by different motes are communicated to the cluster head. The cluster head performs data aggregation which is then communicated to the officials through GSM technology. Whenever the measured real time data crosses a predefined threshold, a complete picture of the environment is sent to the official's mobile as MMS. Failure of any node wont affect the Data Aggregation and data from the remaining node can be used to know about the Environment. The proposed algorithm is built using Atmel Processor and the results are presented.","PeriodicalId":158960,"journal":{"name":"2011 International Conference on Electronics, Communication and Computing Technologies","volume":"596 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-11-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133342755","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信