2018 5th International Conference on Signal Processing and Integrated Networks (SPIN)最新文献

筛选
英文 中文
Beamforming and Combining in Multi-User Large MIMO Systems 多用户大型MIMO系统中的波束形成与组合
M. Arti
{"title":"Beamforming and Combining in Multi-User Large MIMO Systems","authors":"M. Arti","doi":"10.1109/SPIN.2018.8474031","DOIUrl":"https://doi.org/10.1109/SPIN.2018.8474031","url":null,"abstract":"We address the problem of beamforming and combining in a large multiple-input multiple-output systems in Rayleigh fading environment. A very large number of antennas, i.e., Ns are employed at the transmitter. Some fixed number of antennas, i.e., Nt are assigned to each user. A specific transmit weight/beamforming vector is used for transmitting the symbols of a particular user; and the user utilizes a specific combining vector for detecting the transmitted signal. Two different schemes are proposed to calculate beamforming and combining vectors. In first scheme, transmit weight vectors are chosen by using the principle of maximum ratio transmission; and maximum eigen value criterion is used for calculating the combining vector. In second scheme, the concept of null space is used for the calculation of combining vector. It is shown by simulations that proposed schemes works well and second scheme performs better than first scheme.","PeriodicalId":184596,"journal":{"name":"2018 5th International Conference on Signal Processing and Integrated Networks (SPIN)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115704644","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
High Q Half-turn Split Inductor for RF Applications 用于射频应用的高Q半匝分路电感器
B. Murali, N. Rao
{"title":"High Q Half-turn Split Inductor for RF Applications","authors":"B. Murali, N. Rao","doi":"10.1109/SPIN.2018.8474107","DOIUrl":"https://doi.org/10.1109/SPIN.2018.8474107","url":null,"abstract":"Passive components are indispensable in the design and development of Radio Frequency Integrated Circuits (RFIC). In this paper half-turn split inductor is presented with higher quality factor by 31.6% and inductance 15% over conventional planar inductor. High quality factor is a primary requirement to improve the performance of the circuit at high frequency. The quality factor and self resonant frequency is limited by parasitic capacitance effect, current crowding effect and proximity effect. In this proposed structure the quality factor is improved by dividing the each conductor turn by half and placed in to two different layers. When each conductor turns split in two layers the effective capacitance is reduced, hence quality factor is increased. The proposed structure is implemented in the area 60μm × 60μm and simulated by using the SONNET (EM) simulation tool to obtain the results.","PeriodicalId":184596,"journal":{"name":"2018 5th International Conference on Signal Processing and Integrated Networks (SPIN)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114646968","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Enhanced Epidemic Routing Protocol in Delay Tolerant Networks 延迟容忍网络中的增强流行病路由协议
P. Garg, Hemang Kumar, R. Johari, Prabhanshu Gupta, Riya Bhatia
{"title":"Enhanced Epidemic Routing Protocol in Delay Tolerant Networks","authors":"P. Garg, Hemang Kumar, R. Johari, Prabhanshu Gupta, Riya Bhatia","doi":"10.1109/SPIN.2018.8474132","DOIUrl":"https://doi.org/10.1109/SPIN.2018.8474132","url":null,"abstract":"A delay-tolerant network is a network designed to operate over extreme distances such as those encountered in space communications, borderline networks or on an interplanetary scale. Delay tolerant networks are the opportunistic networks, that is transmission occurs as soon as two intermediate nodes comes into each others transmission range. The commonly used routing algorithm in delay tolerant networks is Epidemic Routing Protocol (ERP). Epidemic routing floods away the packets to all the neighboring nodes, which sometimes results in network congestion. The ERP doesn’t take into account the factors such as battery energy level and buffer space, so in the proposed research work, an enhanced version of ERP is hereby proposed which when deployed enables the node to consider battery energy level and buffer space while taking routing decisions. The proposed changes have resulted in the increase in message delivery ratio and decrease in traffic in the network.","PeriodicalId":184596,"journal":{"name":"2018 5th International Conference on Signal Processing and Integrated Networks (SPIN)","volume":"134 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123383405","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Dual Stage Classification of Hand Gestures using Surface Electromyogram 基于表面肌电图的手势双阶段分类
Karush Suri, Rinki Gupta
{"title":"Dual Stage Classification of Hand Gestures using Surface Electromyogram","authors":"Karush Suri, Rinki Gupta","doi":"10.1109/SPIN.2018.8474145","DOIUrl":"https://doi.org/10.1109/SPIN.2018.8474145","url":null,"abstract":"Surface electromyography (sEMG) is becoming exceeding useful in applications involving analysis of human motion such as in human-machine interface, assistive technology, healthcare and prosthetic development. The proposed work presents a novel dual stage classification approach for classification of grasping gestures from sEMG signals. A statistical assessment of these activities is presented to determine the similar characteristics between the considered activities. Similar activities are grouped together. In the first stage of classification, an activity is identified as belonging to a group, which is then further classified as one of the activities within the group in the second stage of classification. The performance of the proposed approach is compared to the conventional single stage classification approach in terms of classification accuracies. The classification accuracies obtained using the proposed dual stage classification are significantly higher as compared to that for single stage classification.","PeriodicalId":184596,"journal":{"name":"2018 5th International Conference on Signal Processing and Integrated Networks (SPIN)","volume":"96 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127104743","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Modern Controller Techniques of Improve Stability of AC Microgrid 提高交流微电网稳定性的现代控制器技术
B. Rathor, M. Bhadu, S. K. Bishnoi
{"title":"Modern Controller Techniques of Improve Stability of AC Microgrid","authors":"B. Rathor, M. Bhadu, S. K. Bishnoi","doi":"10.1109/SPIN.2018.8474249","DOIUrl":"https://doi.org/10.1109/SPIN.2018.8474249","url":null,"abstract":"This paper analysis and investigates the effect of symmetrical fault on grid connected AC microgrid and improve the stability to primary control of synchronous distribution generators. In this ac microgrid four distribution generation units three renewable energy sources PV energy farm, wind energy farm and hydro power source and diesel generator is connected for backup power. The various power system stabilizers are used in control scheme and reduced the damping oscillation overshoot and settling time and comparison of time domain response having without power system stabilizes (PSS), with simple PSS like delta PSS and acceleration power (Pa) PSS, multi-band PSS (MB-PSS) and robust fuzzy based design PSS. Analyzing and performance of the various robust controller as microgrid system stability accessed on simpowersystem toolbox of MATLAB software.","PeriodicalId":184596,"journal":{"name":"2018 5th International Conference on Signal Processing and Integrated Networks (SPIN)","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126576750","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
C3T: Cloud based Cyclic Cryptographic Technique and it’s comparative analysis with classical cipher techniques C3T:基于云的循环密码技术及其与经典密码技术的比较分析
Shubham Gupta, R. Johari, P. Garg, Kalpana Gupta
{"title":"C3T: Cloud based Cyclic Cryptographic Technique and it’s comparative analysis with classical cipher techniques","authors":"Shubham Gupta, R. Johari, P. Garg, Kalpana Gupta","doi":"10.1109/SPIN.2018.8474121","DOIUrl":"https://doi.org/10.1109/SPIN.2018.8474121","url":null,"abstract":"The Symmetric and Asymmetric Cryptographic techniques and algorithms as existing in the literature are either too simple and traditional or too complex to code and understand. In the current research work, a new Cryptographic technique is being proposed which is a blend of both. To show the effectiveness of the proposed \"Cyclic Cryptographic Technique\", it has been compared with well-known Cryptographic technique(s) such as Caesar Cipher, Vigenere Cipher and Affine Cipher and the result exceed the expectations.","PeriodicalId":184596,"journal":{"name":"2018 5th International Conference on Signal Processing and Integrated Networks (SPIN)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125027263","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Detecting DDoS Attack using Software Defined Network (SDN) in Cloud Computing Environment 云计算环境下基于SDN的DDoS攻击检测
K. Bhushan, B. Gupta
{"title":"Detecting DDoS Attack using Software Defined Network (SDN) in Cloud Computing Environment","authors":"K. Bhushan, B. Gupta","doi":"10.1109/SPIN.2018.8474062","DOIUrl":"https://doi.org/10.1109/SPIN.2018.8474062","url":null,"abstract":"In the last one decade, cloud computing has evolved as a new and promising computational platform that provides cost effective and scalable computing facility. The merger of SDN technology with the cloud computing environment simplifies the cloud’s networking complexities and significantly improves the manageability, programmability, dynamism, and scalability of the cloud. In the SDN-based cloud, the essential features of SDN, including global view of the whole network, software based traffic analysis, centralized control over the network, etc. greatly improves the DDoS attack detection and mitigation capabilities of the cloud. In this paper, we first discuss about various essential features of SDN that makes it suitable networking technology for cloud computing. Moreover, we propose an approach to detect DDoS attacks in SDN-based cloud by utilizing the features of SDN. The proposed approach can detect the DDoS attacks with very low communicational and computational overhead. Our claims are well supported by the extensive simulation based experiments.","PeriodicalId":184596,"journal":{"name":"2018 5th International Conference on Signal Processing and Integrated Networks (SPIN)","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126305396","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 31
Effect of Different Optimization Methods in Determining the Clusterheads in Wireless Sensor Network 不同优化方法对无线传感器网络簇头确定的影响
Chiranjib Patra, Samir Biswas, Sourish Mullick
{"title":"Effect of Different Optimization Methods in Determining the Clusterheads in Wireless Sensor Network","authors":"Chiranjib Patra, Samir Biswas, Sourish Mullick","doi":"10.1109/SPIN.2018.8474124","DOIUrl":"https://doi.org/10.1109/SPIN.2018.8474124","url":null,"abstract":"In Wireless Sensor Networks (WSN) the determination of right clusters is NP-hard problem. Hence a lot of indirect methods have been used to go around and approximately solve the problem. In this communication, an effort has been made to use various objective functions from optimization methods to optimize upon this NP-hard problem in determining good clusters. Using this good clusters as solutions, we use LEACH-C framework in assessing the efficiency of the communication and connectivity of the network. Moreover, we also introduce another optimization method called simulated annealing inspired Gompertz (SAIG) to compare upon some of the well-known existing optimization methods.","PeriodicalId":184596,"journal":{"name":"2018 5th International Conference on Signal Processing and Integrated Networks (SPIN)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125693733","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Sign Language Gesture Recognition using Zernike Moments and DTW 基于Zernike Moments和DTW的手语手势识别
Samridhi Mathur, Poonam Sharma
{"title":"Sign Language Gesture Recognition using Zernike Moments and DTW","authors":"Samridhi Mathur, Poonam Sharma","doi":"10.1109/SPIN.2018.8474179","DOIUrl":"https://doi.org/10.1109/SPIN.2018.8474179","url":null,"abstract":"Since the last few decades, a dominant area of research in the vision community has been the gesture recognition, mainly for the purpose of Human Computer Interaction (HCI) and recognition of sign language. In this paper, we are using Zernike Moments as shape descriptors. The proposed system for recognizing sign language mainly consists of following five modules: (1) gesture segmentation based on motion detection analysis, (2) real time detection of both hand regions and face region, (3) key frame extraction for removing redundant frames, (4) the feature extraction phase consists of tracking the hands trajectory in terms of orientation, tracking distance of hands from the centre of the face and determining the hand posture using rotation invariant Zernike Moments and finally (5) gesture recognition based on these extracted features using Dynamic Time Warping (DTW) methodology.","PeriodicalId":184596,"journal":{"name":"2018 5th International Conference on Signal Processing and Integrated Networks (SPIN)","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122252624","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Secure Data Aggregation with Mean Field Extensive Game Theoretic Framework 基于平均场扩展博弈论框架的安全数据聚合
Khyati Chopra, R. Bose, A. Joshi
{"title":"Secure Data Aggregation with Mean Field Extensive Game Theoretic Framework","authors":"Khyati Chopra, R. Bose, A. Joshi","doi":"10.1109/SPIN.2018.8474175","DOIUrl":"https://doi.org/10.1109/SPIN.2018.8474175","url":null,"abstract":"In this paper, game theoretic framework is used as a mathematical tool to address security problems in mobile wireless sensor network (MWSN). In most of the existing works, only attacker and a defender are considered as the two players of the game. With the use of recent advancements made in the mean field game theory, we have proposed a novel extensive game with multiple players for MWSN security, such that the aggregator node can securely compute aggregation data even in the presence of an attack. The proposed scheme enables the aggregator node and an individual node in MWSN to strategically make defense decisions and hence, the confidential data could be faithfully transmitted to base station (BS) for security. Also, each node in this dynamic distributed network, knows the information about its own state and the information about the other nodes’ aggregate effect in the MWSN. Optimal strategic equilibrium solution to our proposed mean field extensive game is given, such that the utility of each player is maximized in the game. Extensive game analysis and study shows that our proposed dynamic algorithm strategically outperforms existing static approach.","PeriodicalId":184596,"journal":{"name":"2018 5th International Conference on Signal Processing and Integrated Networks (SPIN)","volume":"491 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116448389","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信