2015 International Conference on Advances in Computer Engineering and Applications最新文献

筛选
英文 中文
Design of bit serial parallel multiplier using finite field over GF(2P) 基于GF(2P)有限域的位串并联乘法器设计
2015 International Conference on Advances in Computer Engineering and Applications Pub Date : 2015-03-19 DOI: 10.1109/ICACEA.2015.7164845
Amol Mukesh Sangole, U. Ghodeswar
{"title":"Design of bit serial parallel multiplier using finite field over GF(2P)","authors":"Amol Mukesh Sangole, U. Ghodeswar","doi":"10.1109/ICACEA.2015.7164845","DOIUrl":"https://doi.org/10.1109/ICACEA.2015.7164845","url":null,"abstract":"Aggregation of finite field is the easiest of all finite field operations, but on the other side, in the field of arithmetic it is most frequently usable operations. On this Paper, we present simple but effective useful upgradation of the previous hardware design of finite field Aggregation over Galois Field, GF(2p). Here we use Aggregation operation using p number of T flip flop instead of using combination of p number of XOR gate with equal number of D Flip flop Hooked loop structure so as to reduce critical path as well as Hardware complexity. The proposed finite field operations is used further for the implementation of bit serial parallel structure polynomial bases finite field multiplication and conversion of bit serial between polynomial bases representation and normal bases representation over GF(2p). The area, time, delay, Hardware complexity is reduced in proposed Bit serial/Parallel multiplier is reduced of the proposed design.","PeriodicalId":202893,"journal":{"name":"2015 International Conference on Advances in Computer Engineering and Applications","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-03-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114024831","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Enhanced clustering ant colony routing algorithm based on swarm intelligence in wireless sensor network 无线传感器网络中基于群体智能的增强聚类蚁群路由算法
2015 International Conference on Advances in Computer Engineering and Applications Pub Date : 2015-03-19 DOI: 10.1109/ICACEA.2015.7164684
Ankit Verma, P. C. Vashist
{"title":"Enhanced clustering ant colony routing algorithm based on swarm intelligence in wireless sensor network","authors":"Ankit Verma, P. C. Vashist","doi":"10.1109/ICACEA.2015.7164684","DOIUrl":"https://doi.org/10.1109/ICACEA.2015.7164684","url":null,"abstract":"Major issues in wireless sensor networks are performance enhancement and optimize QoS parameters. Paper proposes a novel QoS Algorithm for optimum path routing with routing matrices. Most renowned Dijkstra's algorithm focuses on shortest path but less efficient in congested network. Afterwards, improved ant colony routing algorithm IPACR enhance coverage rate by finding optimum alternate path routing. Cluster-based ant colony routing algorithm ICACR introduced as simplified version and outperform IPACR by lifetime of network, but not efficient when Sink node is close to Source node. Enhanced cluster based algorithm ECACR is proposed in this paper, as enhancement in ICACR in terms of fast PD ratio through sensor nodes and less congested shortest path in wireless networks.","PeriodicalId":202893,"journal":{"name":"2015 International Conference on Advances in Computer Engineering and Applications","volume":"111 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-03-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122699059","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Performance comparison of diversity receivers over TWDP fading channels TWDP衰落信道下分集接收机性能比较
2015 International Conference on Advances in Computer Engineering and Applications Pub Date : 2015-03-19 DOI: 10.1109/ICACEA.2015.7164674
Aheibam Dinamani Singh, N. Meitei
{"title":"Performance comparison of diversity receivers over TWDP fading channels","authors":"Aheibam Dinamani Singh, N. Meitei","doi":"10.1109/ICACEA.2015.7164674","DOIUrl":"https://doi.org/10.1109/ICACEA.2015.7164674","url":null,"abstract":"A signal propagating in wireless channels encounters fading effect, which degrades the performance of wireless communication systems. Information about the performance of communication systems is significant for assuring service availability and sustainability, as well as quality of service in telecommunication networks. Bit error rate, average output Signal to Noise Ratio, outage probability, amount of fading, level crossing rate, etc. are some of the important performance measures for communication systems. One of the efficient counteracting methods that can modify the disparaging outcome of fading for superior performance of receiver is the diversity combining. Some of the important diversity combining schemes are selection combining, equal gain combining and maximal ratio combining. A comparative study of these diversity receivers over two wave diffuse power have been carried out to evaluate the impact of fading parameters K and Δ on their performance.","PeriodicalId":202893,"journal":{"name":"2015 International Conference on Advances in Computer Engineering and Applications","volume":"200 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-03-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123016109","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Detection of unhealthy region of plant leaves using image processing and genetic algorithm 基于图像处理和遗传算法的植物叶片不健康区域检测
2015 International Conference on Advances in Computer Engineering and Applications Pub Date : 2015-03-19 DOI: 10.1109/ICACEA.2015.7164858
V. Singh
{"title":"Detection of unhealthy region of plant leaves using image processing and genetic algorithm","authors":"V. Singh","doi":"10.1109/ICACEA.2015.7164858","DOIUrl":"https://doi.org/10.1109/ICACEA.2015.7164858","url":null,"abstract":"Agricultural productivity is that thing on which Indian Economy highly depends. This is the one of the reasons that disease detection in plants plays an important role in agriculture field, as having disease in plants are quite natural. If proper care is not taken in this area then it causes serious effects on plants and due to which respective product quality, quantity or productivity is affected. Detection of plant disease through some automatic technique is beneficial as it reduces a large work of monitoring in big farms of crops, and at very early stage itself it detects the symptoms of diseases means when they appear on plant leaves. This paper presents an algorithm for image segmentation technique used for automatic detection as well as classification of plant leaf diseases and survey on different diseases classification techniques that can be used for plant leaf disease detection. Image segmentation, which is an important aspect for disease detection in plant leaf disease, is done by using genetic algorithm.","PeriodicalId":202893,"journal":{"name":"2015 International Conference on Advances in Computer Engineering and Applications","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-03-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129176788","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 158
A review of scalable data sharing techniques for secure cloud storage 安全云存储的可扩展数据共享技术综述
2015 International Conference on Advances in Computer Engineering and Applications Pub Date : 2015-03-19 DOI: 10.1109/ICACEA.2015.7164832
Aditi Tripathi, Mayank Deep Khare, P. Singh
{"title":"A review of scalable data sharing techniques for secure cloud storage","authors":"Aditi Tripathi, Mayank Deep Khare, P. Singh","doi":"10.1109/ICACEA.2015.7164832","DOIUrl":"https://doi.org/10.1109/ICACEA.2015.7164832","url":null,"abstract":"Cloud computing is a technology which supplies a shared pool of configurable IT resources such as network, software and database. Cloud Computing provides the facility of centralized data storage, user can access their data online. Cloud storage is very popular now a days. Data which is stored on clouds should be secure from adversaries. In cloud storage data sharing is an important functionality. Data transfer should be done securely and efficiently with others in cloud computing. In this paper we review different scalable data sharing techniques in cloud storage. To minimize the expense of managing and storing secret keys for general cryptographic use is aim of cryptographic key assignment schemes. For supporting flexible hierarchy in decryption power delegation, a encryption scheme is represented which is basically proposed for concisely transmitting large number of decryption keys in broadcast scenario. To protect data privacy is a central question for cloud storage. We illustrate new public-key encryption scheme, which produces constant-size cipher texts such as efficient delegation decryption rights for any set of cipher texts are possible.","PeriodicalId":202893,"journal":{"name":"2015 International Conference on Advances in Computer Engineering and Applications","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-03-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116720799","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Black hole attack's effect mobile ad-hoc networks (MANET) 黑洞攻击对移动自组织网络(MANET)的影响
2015 International Conference on Advances in Computer Engineering and Applications Pub Date : 2015-03-19 DOI: 10.1109/ICACEA.2015.7164846
A. Sardana, Akanksha Saini, T. Bedwal, Radhika Tayal
{"title":"Black hole attack's effect mobile ad-hoc networks (MANET)","authors":"A. Sardana, Akanksha Saini, T. Bedwal, Radhika Tayal","doi":"10.1109/ICACEA.2015.7164846","DOIUrl":"https://doi.org/10.1109/ICACEA.2015.7164846","url":null,"abstract":"Ad-hoc network can be defined as a collection of number of mobile nodes which makes a temporary network. Black hole can be defined as a malicious node which on any request of route replies in an incorrect manner as if it has new route to the goal and then it drops all incoming packets. Loss will be very high if malicious nodes work collectively. This attack can be defined as cooperative black hole attack. This paper gives the analysis of Black Hole ADOV performance by frequently changing number of mobile nodes and by also changing black hole nodes. To analyze this various performance metrics are used which includes average end to end delay, loss of packet and packet delivery ratio and It has been seen that effect on end to end delay is higher that on loss of packet.","PeriodicalId":202893,"journal":{"name":"2015 International Conference on Advances in Computer Engineering and Applications","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-03-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114653893","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
A review on steganography and cryptography 隐写术与密码学研究进展
2015 International Conference on Advances in Computer Engineering and Applications Pub Date : 2015-03-19 DOI: 10.1109/ICACEA.2015.7164679
R. Mishra, Praveen Bhanodiya
{"title":"A review on steganography and cryptography","authors":"R. Mishra, Praveen Bhanodiya","doi":"10.1109/ICACEA.2015.7164679","DOIUrl":"https://doi.org/10.1109/ICACEA.2015.7164679","url":null,"abstract":"Today's information world is a digital world. Data transmission over an unsecure channel is becoming a major issue of concern nowadays. And at the same time intruders are spreading over the internet and being very active. So to protect the secret data from theft some security measures need to be taken. In order to keep the data secret various techniques have been implemented to encrypt and decrypt the secret data. Cryptography and Steganography are the two most prominent techniques from them. But these two techniques alone can't do work as much efficiently as they do together. Steganography is a Greek word which is made up of two words Stegano and graphy. Stegano means hidden and graphy means writing i.e. Steganography means hidden writing. Steganography is a way to hide the fact that data communication is taking place. While cryptography converts the secret message in other than human readable form but this technique is having a limitation that the encrypted message is visible to everyone. In this way over the internet, intruders may try to apply heat and trial method to get the secret message. Steganography overcome the limitation of cryptography by hiding the fact that some transmission is taking place. In steganography the secret message is hidden in other than original media such as Text, Image, video and audio form. These two techniques are different and having their own significance. So in this paper we are going to discuss various cryptographic and steganographic techniques used in order the keep the message secret.","PeriodicalId":202893,"journal":{"name":"2015 International Conference on Advances in Computer Engineering and Applications","volume":"145 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-03-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124724813","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 47
Analysis of attacks on routing protocols in MANETs manet中路由协议攻击分析
2015 International Conference on Advances in Computer Engineering and Applications Pub Date : 2015-03-19 DOI: 10.1109/ICACEA.2015.7164811
Raj Kamal Kapur, S. Khatri
{"title":"Analysis of attacks on routing protocols in MANETs","authors":"Raj Kamal Kapur, S. Khatri","doi":"10.1109/ICACEA.2015.7164811","DOIUrl":"https://doi.org/10.1109/ICACEA.2015.7164811","url":null,"abstract":"Mobile Adhoc Networks (MANETs) are networks of mobile nodes which have limited resources in terms of processing power, memory and battery life. The traffic to the destination nodes which are beyond the range of source nodes are routed by the intermediate nodes. The routing in the MANETs is different from conventional infrastructure network since the nodes not only act as end devices but also act as routers. Owing to the resource constraint of the nodes the routing protocols for MANETs have to be light weight and assume a trusted environment. The absence of any infrastructure for security and ever changing topology of the network makes the routing protocols vulnerable to variety of attacks. These attacks may lead to either misdirection of data traffic or denial of services. The mitigation techniques to combat the attacks in MANETs have to work under severe constraints, and therefore it is imperative to study the vulnerabilities of the routing protocols and methods of launching the attack in detail. This paper attempts to do the same and has reviewed some current literature on mitigation of the routing attacks.","PeriodicalId":202893,"journal":{"name":"2015 International Conference on Advances in Computer Engineering and Applications","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-03-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126850599","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
Energy efficient fault tolerant and clustering algorithm using alternative backup set for wireless sensor network 基于备选备份集的无线传感器网络节能容错聚类算法
2015 International Conference on Advances in Computer Engineering and Applications Pub Date : 2015-03-19 DOI: 10.1109/ICACEA.2015.7164771
Ishant Sharma, Balpreet Singh
{"title":"Energy efficient fault tolerant and clustering algorithm using alternative backup set for wireless sensor network","authors":"Ishant Sharma, Balpreet Singh","doi":"10.1109/ICACEA.2015.7164771","DOIUrl":"https://doi.org/10.1109/ICACEA.2015.7164771","url":null,"abstract":"In this paper, we proposed an efficient algorithm which works on two major issues fault tolerant and cluster formation. Clustering is an approach which helps to maintain the overall communications between the sensor nodes and cluster heads. This proposed algorithm also helps in recovery of cluster from sudden failure of cluster head at any round. An alternative cluster head (back up node) is deploying with all the clusters which activates when they received a HELP message from member sensor nodes whenever the member sensor nodes do not able to reach the cluster head.","PeriodicalId":202893,"journal":{"name":"2015 International Conference on Advances in Computer Engineering and Applications","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-03-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125132462","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Approach to perform horizontal and vertical handoff in wireless network 在无线网络中实现水平和垂直切换的方法
2015 International Conference on Advances in Computer Engineering and Applications Pub Date : 2015-03-19 DOI: 10.1109/ICACEA.2015.7164815
Priti B. Ghormade, J. Shah
{"title":"Approach to perform horizontal and vertical handoff in wireless network","authors":"Priti B. Ghormade, J. Shah","doi":"10.1109/ICACEA.2015.7164815","DOIUrl":"https://doi.org/10.1109/ICACEA.2015.7164815","url":null,"abstract":"Multiple wireless access network combine together to form wireless communication system. Making handoff decision is critical task in wireless networks and it increases day by day with increase the number of mobile devices which is interface with the network. In this scheme we are going to propose the seamless approach to perform vertical and horizontal handoff. This scheme will reduce the probability of call blocking and dropping during the handoff process. This also helps to reduce the unnecessary handoff in networks.","PeriodicalId":202893,"journal":{"name":"2015 International Conference on Advances in Computer Engineering and Applications","volume":"305 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-03-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124284068","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信