{"title":"Resource allocation for cognitive radio network using particle swarm optimization","authors":"Seshadri Binaya Behera, D. Seth","doi":"10.1109/ECS.2015.7124992","DOIUrl":"https://doi.org/10.1109/ECS.2015.7124992","url":null,"abstract":"Cognitive radio network is one of the emerging areas in the field of next generation wireless network. This network is an alternative and more suitable solution to the high demands of resources for facilitating integrated & multimedia services. Instead of fixed spectrum allocation as it is done in conventional wireless networks, the cognitive radio network is based on dynamic spectrum allocation procedure. The success of this radio network depends on how efficiently these spectrums or the resources are allocated. The CR users (Secondary users) will be allocated with the unused licensed spectrums available in the white space without causing interference to the licensed primary users. Further, the resource allocation decision depends on the SINR, BER etc. requirements of the CR users and the power requirement in each channel. In this work, particle swarm optimization technique is used to optimize the resource allocation problem. It is seen that with greater number of particles in a swarm along with more number of iterations increases the fitness of the variables.","PeriodicalId":202856,"journal":{"name":"2015 2nd International Conference on Electronics and Communication Systems (ICECS)","volume":"15 36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124256487","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Review on target coverage and network connectivity in Mobile Sensor Networks","authors":"Sonali M. Karegaonkar, A. Raut","doi":"10.1109/ECS.2015.7124954","DOIUrl":"https://doi.org/10.1109/ECS.2015.7124954","url":null,"abstract":"Target Coverage and network connectivity are two main challenging and practically important issues of Mobile Sensor Networks (MSNs). Target coverage covers a set of specified points of interest in the deployment region of a WSN. Target coverage guarantees that every location in the sensing field is covered by at least one sensor and Network Connectivity guarantees that there are sufficient routing paths between sensors. Connectivity is necessary for sensors to collect data and report data to the sink node. Target Coverage and Network Connectivity may also affect the quality of network. Many studies have been introduced to improve the quality of coverage and network connectivity. In this paper, the study of different approaches which improves quality of both Target coverage and Network connectivity, are presented with their features and drawbacks. Improving both Target coverage and Network Connectivity by minimizing the number of sensors used and sensor's movement distance is the important issue in mobile sensor network.","PeriodicalId":202856,"journal":{"name":"2015 2nd International Conference on Electronics and Communication Systems (ICECS)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121187212","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Combined modulation and code design approach for MAI canelation in OCDMA system","authors":"V. Geetha, B. Manoharan","doi":"10.1109/ECS.2015.7124962","DOIUrl":"https://doi.org/10.1109/ECS.2015.7124962","url":null,"abstract":"Optical code division multiple access (OCDMA) is a promising technology for optical networks especially for optical signal multiplexing as it offers huge bandwidth, secure transmission and high speed. The OCDMA system performance is limited by multiple access interference (MAI) due to asynchronous nature of transmission. This paper discuss an MAI cancellation technique for OCDMA system by incorporating M-ary-FSK Modulation and also by employing double padded modified prime code as a signature sequence. The FSK-OCDMA system performance is compared with the existing pulse position modulation (PPM)-OCDMA system. The results reveal that the FSK-OCDMA system achieve better MAI cancellation by providing lower bit error rate than the PPM-OCDMA system.","PeriodicalId":202856,"journal":{"name":"2015 2nd International Conference on Electronics and Communication Systems (ICECS)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115180656","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"RSSI estimation using Bluetooth in smart phones","authors":"S. Rajkiran, C. Balakrishnan","doi":"10.1109/ECS.2015.7124822","DOIUrl":"https://doi.org/10.1109/ECS.2015.7124822","url":null,"abstract":"The “On-Time” communication has become an tremendous implication in the real world scenarios. Moreover the problem of proximity estimation is found to be difficult in a variety of environment. Existing approaches such as Global Positioning System and Wi-Fi triangulations are insufficient to meet the requirements of accuracy and also requires high cost. In this paper, the Bluetooth which is commonly available in all Smartphone's are used to find the proximity over a shorter distance and also this paper provides an estimation model to determine the distance based on the Received Signal Strength Indicator values of the Bluetooth. In order to provide a high accuracy in finding the proximity the Values of atmospheric pressure and light sensor data are also collected and used in the RSSI estimation. For every 30sec these values are updated in the cloud server technology and thus the \"On Time\" proximity estimation between the devices can be determined based on the RSSI values of Bluetooth in different environments with high accuracy and low cost.","PeriodicalId":202856,"journal":{"name":"2015 2nd International Conference on Electronics and Communication Systems (ICECS)","volume":"8 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123659458","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Review on data mining techniques in wireless sensor networks","authors":"A. Raut, S. Khandait","doi":"10.1109/ECS.2015.7124932","DOIUrl":"https://doi.org/10.1109/ECS.2015.7124932","url":null,"abstract":"Over the past few years, wireless sensor networks (WSN) have emerged as one of the most exciting fields in Computer Science research. A Wireless Sensor Network (WSN) is a set of sensors that are integrated with a physical environment. These sensors are small in size, and capable of sensing physical phenomenon and processing them. The main aim of deploying applications based on WSNs is to make use of the data sensed by the sensors to raise the real-time decisions. The main limitations of WSNs are characteristics of sensor nodes and nature of sensor data generated by networks. Due to these limitations, traditional data mining techniques are not suitable to WSNs. As the data generated by WSNs is highly resource-constrained, huge in volume, fast changing, it is very challenging to design suitable data mining techniques for WSNs. This inspires to explore a novel and appropriate data mining technique capable of extracting knowledge from huge volume and variety of continuously arriving data from WSNs. In this paper different existing data mining techniques adopted for WSNs are examined with different classification, evaluation approaches, Finally, some research challenges related to adopting data mining techniques in WSNs are also pointed out.","PeriodicalId":202856,"journal":{"name":"2015 2nd International Conference on Electronics and Communication Systems (ICECS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131307143","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Efficient anomaly detection and mitigation in software defined networking environment","authors":"R. Sathya, R. Thangarajan","doi":"10.1109/ECS.2015.7124952","DOIUrl":"https://doi.org/10.1109/ECS.2015.7124952","url":null,"abstract":"A Computer network or data communication network is a telecommunication network that allows computers to exchange data. Computer networks are typically built from a large number of network devices such as routers, switches and numerous types of middle boxes with many complex protocols implemented on them. They need to accomplish very complex tasks with access to very limited tools. As a result, network management and performance tuning is quite challenging. Software-Defined Networking (SDN) is an emerging architecture purporting to be adaptable, cost-effective, dynamic and manageable pursuing to be suitable for the high-bandwidth, changing nature of today's applications. SDN architectures decouples network control and forwarding functions, making network control to become directly programmable and the underlying infrastructure to be abstracted from applications and network services. The network security is a prominent feature of the network ensuring accountability, confidentiality, integrity, and protection against many external and internal threats. An Intrusion Detection System (IDS) is a type of security software designed to automatically alert administrators when someone or something is trying to compromise information system through malicious activities or through security policy violations. Security violation in SDN environment needs to be identified to prevent the system from an attack. The proposed work aims to detect the attacks on SDN environment. Detecting anomalies on SDN environment will be more manageable and efficient.","PeriodicalId":202856,"journal":{"name":"2015 2nd International Conference on Electronics and Communication Systems (ICECS)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125639831","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Evaluation of various pansharpening methods using image quality metrics","authors":"Ashish D. Dhore, C. Veena","doi":"10.1109/ECS.2015.7125039","DOIUrl":"https://doi.org/10.1109/ECS.2015.7125039","url":null,"abstract":"The pansharpening has been a wide area of interest during these days because of its applications in remote sensing, geoscience. Day by day it is going deep, vast and interesting as well. The concept arises due to the fact that data provided by most earth observation satellites such as Ikonos, geoeye, quickbird and wordview2 are composed of several channels of multispectral image and single channel of panchromatic image. The pansharpening is derived from the fusion of these two images, which actually combines the characteristics of these two images. The image quality metrics provide the information about the special and spectral quality of the image. These special and spectral qualities are provided by the panchromatic and multispectral image. Most of the existing pan-sharpening quality assessment methods consider only the spectral quality and there are just few inventions which concentrate on these spatial characteristics. This paper presents a novel approach for spatial quality evaluation of pan-sharpening in high resolution satellite imagery. Obtained results clearly show the wide spatial discrepancy in quality of Pan-sharpened images, resulting from various pan-sharpening fusion methods which confirm the need for spatial quality valuation of fused products.","PeriodicalId":202856,"journal":{"name":"2015 2nd International Conference on Electronics and Communication Systems (ICECS)","volume":"240 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124644017","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Analysing various fading channels using different modulation techniques under IEEE 802.16 standard","authors":"Mranali Joshi, Amar Nath Dubey, D. K. Panda","doi":"10.1109/ECS.2015.7124911","DOIUrl":"https://doi.org/10.1109/ECS.2015.7124911","url":null,"abstract":"An extensive demonstration of WiMAX system has been presented in this paper. The proposed system is tested under Rayleigh, Rician, Nakagami and Lognormal shadowing channel with different modulation techniques. It is seen from the simulation results that the WiMAX system provides good reduced bit error rate, with BPSK, 4-QAM, and QPSK techniques. We have estimated that different modulation techniques and analyse BER for all different fading channels. Among all different channels Nakagami channel using different modulation technique under IEEE 802.16 standard provide better performance at higher SNR. Thus, we can say that the Nakagami channel is best to achieve optimum utilization of bandwidth.","PeriodicalId":202856,"journal":{"name":"2015 2nd International Conference on Electronics and Communication Systems (ICECS)","volume":"569 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116531055","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
J. Navamani, M. L. Veena, A. Lavanya, K. Vijayakumar
{"title":"Efficiency comparison of quadratic boost DC-DC converter in CCM and DCM","authors":"J. Navamani, M. L. Veena, A. Lavanya, K. Vijayakumar","doi":"10.1109/ECS.2015.7124765","DOIUrl":"https://doi.org/10.1109/ECS.2015.7124765","url":null,"abstract":"This paper presents efficiency comparison of quadratic boost converter in continuous conduction mode (CCM) and discontinuous conduction mode (DCM). Analytical expression for the DC component and RMS component of currents in CCM and DCM is derived. Total losses incurred in quadratic boost converter are calculated. Discontinuous conduction modes in three cases are discussed. The simulation result in software MATLAB/SIMULINK is presented for validating the results obtained by mathematical theories.","PeriodicalId":202856,"journal":{"name":"2015 2nd International Conference on Electronics and Communication Systems (ICECS)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131163816","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Backbone based multicast routing protocol for route recovery in MANETs","authors":"Deepika Vodnala, Srinivas Aluvala, S. Kumar","doi":"10.1109/ECS.2015.7124900","DOIUrl":"https://doi.org/10.1109/ECS.2015.7124900","url":null,"abstract":"Mobile ad-hoc network is an infrastructure independent and self-organizing network where the mobile nodes are communicated with each other through wireless links. Due to some reasons such as frequent topological changes, packet collisions and bad channels which may cause some link breakages in MANETs. In the existing protocol i.e. Adaptive Dynamic Backbone Multicast Routing Protocol, if any link or node failure occurs then there is no scope to recover that failure. In order to avoid these link failures. In this paper we are coming up with a new protocol called Backbone Based Multicast Route Recovery Protocol to overcome the drawbacks of the existing protocol. This protocol constructs a virtual backbone by using a three step procedure that includes neighbor selection, core selection and core connection processes. The proposed protocol provides more efficiency and robustness and can be easily adopted in any sort of environments like static or dynamic areas. And also reduces the flooding and storage overhead at each core node and other nodes in the network.","PeriodicalId":202856,"journal":{"name":"2015 2nd International Conference on Electronics and Communication Systems (ICECS)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133057039","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}