2011 International Conference on Emerging Trends in Networks and Computer Communications (ETNCC)最新文献

筛选
英文 中文
Review of energy efficient routing algorithm as LPP in wireless sensor network 无线传感器网络中LPP算法的研究进展
S. Jain, P. Kaushik, J. Singha
{"title":"Review of energy efficient routing algorithm as LPP in wireless sensor network","authors":"S. Jain, P. Kaushik, J. Singha","doi":"10.1109/ETNCC.2011.6255912","DOIUrl":"https://doi.org/10.1109/ETNCC.2011.6255912","url":null,"abstract":"In wireless sensor network most of the devices operate on batteries. These devices or nodes have limited amount of initial energy that are consumed at different rates, depending on the power level and intended receiver. In this paper different type of energy efficient routing algorithms are discussed and approach of these algorithms provide the maximum system lifetime. Most of the algorithms formulate the routing problem as a linear programming problem, which uses the optimal flow path for data transmission and gives the optimum results. These algorithms help to minimize the consumption of large battery power as well as increase the overall lifetime of the network. Advantages, limitations as well as comparative study of these algorithms are also discussed in this paper.","PeriodicalId":221059,"journal":{"name":"2011 International Conference on Emerging Trends in Networks and Computer Communications (ETNCC)","volume":"72 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129167141","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A review of misbehaviour detection and avoidance scheme in ad hoc network 自组织网络中错误行为检测与避免方案的研究进展
R. Raghuvanshi, R. Kaushik, J. Singhai
{"title":"A review of misbehaviour detection and avoidance scheme in ad hoc network","authors":"R. Raghuvanshi, R. Kaushik, J. Singhai","doi":"10.1109/ETNCC.2011.6255909","DOIUrl":"https://doi.org/10.1109/ETNCC.2011.6255909","url":null,"abstract":"Misbehaving of nodes in ad hoc network is a more sophisticated problem in recent research area. Therefore, detecting misbehavior has been an arduous task for researchers since last few years. Misbehavior node can be selfish or malicious which degrade or disrupt the performance of network upto a great extent. For this, different types of mechanism have already been proposed. In this paper, different mechanisms for detection and prevention of misbehavior node are discussed in detail. This paper contributes in understanding of most appropriate defense mechanisms by providing a comprehensive comparison between them, based on the type of misbehavior they solve. These mechanisms can be integrated into existing or future work to make them resilient to misbehaving nodes. Also, a check list provides a guideline to identify the pros and cons of respected approaches, so that appropriate parameters can be adjusted to enhance network performance.","PeriodicalId":221059,"journal":{"name":"2011 International Conference on Emerging Trends in Networks and Computer Communications (ETNCC)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122363388","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Robust two-way locking protocol for key exchange 用于密钥交换的健壮的双向锁定协议
S. Shetty, S. Hegde
{"title":"Robust two-way locking protocol for key exchange","authors":"S. Shetty, S. Hegde","doi":"10.1109/ETNCC.2011.6255883","DOIUrl":"https://doi.org/10.1109/ETNCC.2011.6255883","url":null,"abstract":"Sharing of symmetric key between the sender and receiver for encryption and decryption is considered to be one of the major issues in the communication networks. It is due to the fact that the strength of cryptosystem depends not only on the strength of the key, but also on the underlying key exchange protocol. In this paper, we propose a Robust Two-way Locking Protocol which overcomes the drawback of Diffie-Hellman key exchange protocol in terms of flexibility provided to the sender for selecting the desired key. Moreover we demonstrate the applicability of the proposed protocol in TCP handshake and compare it with Secure TCP which is based on Diffie-Hellman (DH) key exchange protocol. Based on the simulation results it is observed that Robust Two-way Locking (RoToLo) Protocol incurs negligible overhead in the network while providing greater flexibility of key selection to the sender as compared to Secure TCP.","PeriodicalId":221059,"journal":{"name":"2011 International Conference on Emerging Trends in Networks and Computer Communications (ETNCC)","volume":"75 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130518535","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Eradication of funneling effect in wireless communication using TDMA based MAC 基于TDMA的MAC消除无线通信中的漏斗效应
R. Gaur, S. Kumar, D. Gaur
{"title":"Eradication of funneling effect in wireless communication using TDMA based MAC","authors":"R. Gaur, S. Kumar, D. Gaur","doi":"10.1109/ETNCC.2011.6255888","DOIUrl":"https://doi.org/10.1109/ETNCC.2011.6255888","url":null,"abstract":"With the rapid development of wireless communication technologies, the idea to use wireless technology in industrial plant floor is striking and the benefits are manifold [1]. The many to-one and hop-by-hop network makes the aperture a barrier and causes a kind of clogging called funnelling effect near the aperture and thus influence real-time and consistency. In this paper, we first present an industrial wireless communication protocol for factory automation systems based on IEEE802.15.4. We present a transmitting rate control technique that takes the fairness issue into consideration for many-to-one routing to reduce the conduit effect. Funnelling-MAC is based on network-wide CSMA and localized, sink-oriented TDMA to mitigate funnelling effect [8]. We introduce a priority based service differentiation and adaptive TDMA time slot scheduling mechanism to solve the clogging in the aperture [9]. The analysis shows this technique eradicates the funnelling effect, improve the communication performance and satisfy the requirements of the industrial Applications.","PeriodicalId":221059,"journal":{"name":"2011 International Conference on Emerging Trends in Networks and Computer Communications (ETNCC)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131241818","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An adiabatic single phase N-type and P-type CPAL technique for full adder design 用于全加法器设计的绝热单相n型和p型CPAL技术
B. Patpatia, N. Arora, B. P. Singh, K. Mehta, N. Swami
{"title":"An adiabatic single phase N-type and P-type CPAL technique for full adder design","authors":"B. Patpatia, N. Arora, B. P. Singh, K. Mehta, N. Swami","doi":"10.1109/ETNCC.2011.6255895","DOIUrl":"https://doi.org/10.1109/ETNCC.2011.6255895","url":null,"abstract":"This paper presents new design techniques for adiabatic full adder cell. Adiabatic logic is the most efficient energy saving technique which provides very low power dissipation in VLSI circuits. Adiabatic Full adder is simulated by using different adiabatic techniques. Simulation results show that energy loss of adiabatic circuits can be greatly reduced by using Complementary Pass Transistor Adiabatic Logic technique. All the circuits have been simulated on BSIM3V3 90nm technology on tanner EDA tool.","PeriodicalId":221059,"journal":{"name":"2011 International Conference on Emerging Trends in Networks and Computer Communications (ETNCC)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123360858","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Implementing trust policies for cloud: A case study 为云实现信任策略:一个案例研究
Aradhana, Inderveer Chana
{"title":"Implementing trust policies for cloud: A case study","authors":"Aradhana, Inderveer Chana","doi":"10.1109/ETNCC.2011.6255920","DOIUrl":"https://doi.org/10.1109/ETNCC.2011.6255920","url":null,"abstract":"Identity provisioning is one of the major concerns in cloud security. Traditionally users were authenticated on the mere basis of static agreement made between the two principals like SLA. However cloud scenarios require dynamic trust management to allow user to access services. This paper describes trust policies that can help in better decision making regarding whom to trust. The implementation of the trust policies has been demonstrated through a case study.","PeriodicalId":221059,"journal":{"name":"2011 International Conference on Emerging Trends in Networks and Computer Communications (ETNCC)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121098011","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Turbo decoding in ISI channels 在ISI信道Turbo解码
S. Soni, K. Vasudevan, P. S. Chauhan, Yashu Shanker
{"title":"Turbo decoding in ISI channels","authors":"S. Soni, K. Vasudevan, P. S. Chauhan, Yashu Shanker","doi":"10.1109/ETNCC.2011.5958495","DOIUrl":"https://doi.org/10.1109/ETNCC.2011.5958495","url":null,"abstract":"Turbo codes are family of forward error correcting codes, whose performance is near Shannon limit. Turbo decoding is based on the maximum a-posterior algorithm (MAP) algorithm. In this paper, the problem of turbo decoding in ISI channel is studied. A Super-trellis structure method has been presented and modified turbo decoding is suggested. Two methods have been suggested for turbo decoding in ISI channel. In the first method, we take all possible combinations of output of encoder-2 and in method-2, output of each encoder is passed through channel filter independently. Method-2 performs better than method-1 but requires higher bandwidth. The improvement in performance is demonstrated through simulations.","PeriodicalId":221059,"journal":{"name":"2011 International Conference on Emerging Trends in Networks and Computer Communications (ETNCC)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125103983","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Smart metering and home automation solutions for the next decade 未来十年的智能电表和家庭自动化解决方案
Shafik Ahmad
{"title":"Smart metering and home automation solutions for the next decade","authors":"Shafik Ahmad","doi":"10.1109/ETNCC.2011.5958516","DOIUrl":"https://doi.org/10.1109/ETNCC.2011.5958516","url":null,"abstract":"This paper emphasizes the use of the smart metering and home automation technologies for efficient utilization of energy, thus paving the way for a cleaner and greener environment for future generations. Next decade will revolutionize smart metering, Information and communications technology (ICT) and home automation by making it affordable, efficient and within the common man's reach. World over, tremendous work is going on in Advanced Metering Infrastructure (AMI), Smart Metering and Home Automation. Short distance Radio Frequency (RF) technologies like ZigBee#, Z-Wave#, Low Power Radio and Distribution Line Carrier (DLC) are ready to enter every household as the Home Area Network (HAN) of the future. Countries like USA, Australia and Italy etc have already started using AMI solutions while countries like China, South Korea, Austria, Spain, Sweden, Finland, Denmark, Netherlands, Norway, Ireland and UK are in process of implementing AMI [9]. In India under the Restructured Accelerated Power Development & Reform Program (R-APDRP), in the XI five year plan, smart metering and ICT solutions have been planned to increase efficiency, loss reduction, reduce energy theft and for efficient data collection for better energy accounting in the electrical sector. This is the beginning of the AMI in India [12].","PeriodicalId":221059,"journal":{"name":"2011 International Conference on Emerging Trends in Networks and Computer Communications (ETNCC)","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124486914","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 65
Audio watermarking using combination of multilevel wavelet decomposition, DCT and SVD 多级小波分解、DCT和奇异值分解相结合的音频水印技术
A. Singhal, Anurag Narayan Chaubey, C. Prakash
{"title":"Audio watermarking using combination of multilevel wavelet decomposition, DCT and SVD","authors":"A. Singhal, Anurag Narayan Chaubey, C. Prakash","doi":"10.1109/ETNCC.2011.6255894","DOIUrl":"https://doi.org/10.1109/ETNCC.2011.6255894","url":null,"abstract":"Digital watermarking is the process of embedding copyrighting information into digital media frame. They are preferred to be imperceptible to the end users. In this paper we propose a novel audio watermarking technique. The algorithm proposed uses multilevel wavelet decomposition, DCT (Discrete Cosine Transform) and SVD (Singular Value Decomposition) to achieve robustness and inaudibility. Audio Quality parameters (metrics) are calculated and analyzed after applying various attacks on the watermarked signal.","PeriodicalId":221059,"journal":{"name":"2011 International Conference on Emerging Trends in Networks and Computer Communications (ETNCC)","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131556934","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Woofer design for optimal sound output 低音炮设计,最佳声音输出
V. Sharma, G. Marwaha, S. Agrawal
{"title":"Woofer design for optimal sound output","authors":"V. Sharma, G. Marwaha, S. Agrawal","doi":"10.1109/ETNCC.2011.6255898","DOIUrl":"https://doi.org/10.1109/ETNCC.2011.6255898","url":null,"abstract":"While designing a speaker a trade-off has to be maintained between the amplification and the power consumed. Improvements in conventional design have been made to improve the damping characteristics but no conclusive work addresses the cumulative problem as described above. The purpose of the current paper is to achieve an optimal sound output by modifying the basic design of the system.","PeriodicalId":221059,"journal":{"name":"2011 International Conference on Emerging Trends in Networks and Computer Communications (ETNCC)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129134385","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信
小红书