2011 International Conference on Emerging Trends in Networks and Computer Communications (ETNCC)最新文献

筛选
英文 中文
Analyses of web usage mining techniques to enhance the capabilities of E-learning environment 分析了网络使用挖掘技术提高电子学习环境的能力
A. Yadav, S. Jain
{"title":"Analyses of web usage mining techniques to enhance the capabilities of E-learning environment","authors":"A. Yadav, S. Jain","doi":"10.1109/ETNCC.2011.6255890","DOIUrl":"https://doi.org/10.1109/ETNCC.2011.6255890","url":null,"abstract":"World Wide Web is today the most important media for collecting, sharing and distributing information. Education is one of the fields where web-based technology has been quickly and successfully adopted. Web mining is active research area which involves transformation and interpretation of web data to find out the hidden information by using various data mining techniques which will be useful in enhancing E learning environment. Web usage mining for e learning environment can mine the server logs to find the user usage pattern so that users can be provided with more personalized services. WUM is one of the latest techniques in web data mining which can provide an effective platform to the learner. We focus on identifying learning pattern of learners. This paper introduces how by using WUM techniques we can make e learning environment more effective. Based on WUM technique how we can design an effective e learning environment and implementation of the model builds more intelligent system and can promote interest of learners or learning environment is modifying its behavior to reflect learning style.","PeriodicalId":221059,"journal":{"name":"2011 International Conference on Emerging Trends in Networks and Computer Communications (ETNCC)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130965028","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
128 bit AES implementation for secured wireless communication 用于安全无线通信的128位AES实现
Gohil Rikitaben Karsanbhai, M. Shajan
{"title":"128 bit AES implementation for secured wireless communication","authors":"Gohil Rikitaben Karsanbhai, M. Shajan","doi":"10.1109/ETNCC.2011.6255889","DOIUrl":"https://doi.org/10.1109/ETNCC.2011.6255889","url":null,"abstract":"Data Security is primary concern for every communication system. There are many ways to provide security data that is being communicated. However, security is assured irrespective of the hackers are from the noise. This Paper describes a design of effective security for data communication by implementing AES (Advanced Encryption Standard) algorithm for encryption and decryption.","PeriodicalId":221059,"journal":{"name":"2011 International Conference on Emerging Trends in Networks and Computer Communications (ETNCC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133312781","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Energy efficient routing protocols for mobile AdHoc networks 移动AdHoc网络的节能路由协议
Rupali A. Mahajan, Ms. Rupali Jagatap
{"title":"Energy efficient routing protocols for mobile AdHoc networks","authors":"Rupali A. Mahajan, Ms. Rupali Jagatap","doi":"10.1109/ETNCC.2011.5958502","DOIUrl":"https://doi.org/10.1109/ETNCC.2011.5958502","url":null,"abstract":"Adhoc on demand distance vector routing protocol is specially designed for mobile adhoc networks with reduced overhead using Expanding Ring Search technique. But energy consumption should also be considered in MANET due to battery constrain of the nodes. In this paper, we propose an energy efficient route discovery process for AODV based on ERS. Our approach saves energy of the nodes by avoiding the redundant rebroadcasting of the route request packets. The relaying status of the node is decided based on the broadcasting of its RREQ packets by its neighbors. And it helps in reducing routing overhead incurred during the route discovery process. Simulations are performed to study the performance of Energy Efficient AODV (E2AODV) protocol using GloMoSim, the Global Mobile Simulator. This E2AODV reduces energy consumption by 75–85% compared to AODV. It also reduces routing overhead of around 65–75% and there by reduces 60–70% collisions.","PeriodicalId":221059,"journal":{"name":"2011 International Conference on Emerging Trends in Networks and Computer Communications (ETNCC)","volume":"158 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122297535","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 28
An analytical model for reverse link outage probability in OFDMA wireless system OFDMA无线系统中反向链路中断概率的分析模型
R. B. Jain
{"title":"An analytical model for reverse link outage probability in OFDMA wireless system","authors":"R. B. Jain","doi":"10.1109/ETNCC.2011.5958509","DOIUrl":"https://doi.org/10.1109/ETNCC.2011.5958509","url":null,"abstract":"In a cellular OFDMA network, the outage probability is an important performance measure. It is useful in the design of a network to guarantee a certain quality of service (QOS) such as threshold Signal to interference ratio or data rate or bit error rate. In this work, a model is presented to determine the inter-cell interference (ICI) in downlink for a universal frequency reuse cellular OFDMA network. It is used to find the outage probability of a user for a given threshold SIR or Data rate or a target BER. From this the number of subcarriers can be determined for a given position and data rate requirement. Simulation results demonstrate the correctness of numerical evaluations.","PeriodicalId":221059,"journal":{"name":"2011 International Conference on Emerging Trends in Networks and Computer Communications (ETNCC)","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126285430","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Performance evaluation of mobility model and routing protocols for inter vehicular communication system 车际通信系统移动模型和路由协议的性能评价
R. Shukla, N. Tyagi
{"title":"Performance evaluation of mobility model and routing protocols for inter vehicular communication system","authors":"R. Shukla, N. Tyagi","doi":"10.1109/ETNCC.2011.6255900","DOIUrl":"https://doi.org/10.1109/ETNCC.2011.6255900","url":null,"abstract":"Vehicular Ad hoc networks (VANETs) allow vehicles to form a self-organized network without the need for a permanent infrastructure. Successful implementations of VANET require standard network protocols, secure communication, and coverage of wireless network among vehicles as well as drivers themselves. This paper presents a simulation study of Realistic Vehicular Mobility Model on the performance study of VANET that uses topology based Ad-hoc On-Demand Distance Vector (AODV) and Dynamic Source Routing (DSR) as the routing protocol. It gives an overview of the developments of the mobility model and routing protocols for VANET.","PeriodicalId":221059,"journal":{"name":"2011 International Conference on Emerging Trends in Networks and Computer Communications (ETNCC)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128023787","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Performance analysis of RED with different TCP congestion control mechanism 不同TCP拥塞控制机制下RED的性能分析
E. Kumar, S. Chugh, S. P. Ghrera
{"title":"Performance analysis of RED with different TCP congestion control mechanism","authors":"E. Kumar, S. Chugh, S. P. Ghrera","doi":"10.1109/ETNCC.2011.6255933","DOIUrl":"https://doi.org/10.1109/ETNCC.2011.6255933","url":null,"abstract":"In this paper we describe RED-Random Early Detection which is an active queue management algorithm for congestion control. The basic idea of RED is that one should not wait till the buffer is full in order to detect drop packets but start detecting congestion before the buffer overflows. In this paper we present the performance behavior of RED which it posses under different congestion control schemes such as Reno, Vegas, Sack 1, and Fact. It shows that with different TCP congestion control mechanism that RED posses for the queue and the average queue plotation during the transmission on data on the network. Simulations are carried on ns simulator to study the performance RED with TCP mechanism.","PeriodicalId":221059,"journal":{"name":"2011 International Conference on Emerging Trends in Networks and Computer Communications (ETNCC)","volume":"67 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127225360","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Quality of state improvisation through evaluation function optimization in genetic application learning 遗传应用学习中评价函数优化的状态即兴质量
D. Singh, Chirag S. Thaker, Sanjay M. Shah
{"title":"Quality of state improvisation through evaluation function optimization in genetic application learning","authors":"D. Singh, Chirag S. Thaker, Sanjay M. Shah","doi":"10.1109/ETNCC.2011.5958494","DOIUrl":"https://doi.org/10.1109/ETNCC.2011.5958494","url":null,"abstract":"Artificial intelligence algorithms have been applied on computer board games since 1950s. Board Games provide competitive, cognitive learning and dynamic environments that make them ideal area of computational intelligence theories, architectures, and algorithms. Natural Evolution can also be considered to be a game play in which the rewards for a test organism that plays a good game of life are the propagation of its genetic material to its successors and its continued survival. In natural evolution, the fitness of an individual is defined with respect to its competitors and collaborators, as well as to the environment. Evolutionary algorithms follow the same path to evolve game playing programs. Among all computer board games, because of its low branching property, Reversi (Game of Othello) playing program can easily defeat humans by designing with strategies based game moves. Here on, the goal of computer Reversi game is no longer to challenge or defeat human players but to compete and evolve against other computer programs. This paper mainly highlights optimization of Reversi program fitness values by applying genetic operators through linear evaluation function.","PeriodicalId":221059,"journal":{"name":"2011 International Conference on Emerging Trends in Networks and Computer Communications (ETNCC)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126692664","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Equalization in faded wireless channels using ANN and coding 基于神经网络和编码的衰落无线信道均衡
B. B. Baruah, K. K. Sarma
{"title":"Equalization in faded wireless channels using ANN and coding","authors":"B. B. Baruah, K. K. Sarma","doi":"10.1109/ETNCC.2011.6255924","DOIUrl":"https://doi.org/10.1109/ETNCC.2011.6255924","url":null,"abstract":"Artificial Neural Network (ANN) based equalization and channel coding has been performed jointly to minimize Inter Symbol Interference (ISI) and noise over multipath faded channel. Further ANN equalization has been compared with a non-ANN MMSE equalizer to compare its performance and along with them (7, 4) Hamming coding is used for more minimization of the noise disturbances so as to achieve a superior BER values for the system. The designed ANN-based equalizer is tested over fading channel with a BPSK signal.","PeriodicalId":221059,"journal":{"name":"2011 International Conference on Emerging Trends in Networks and Computer Communications (ETNCC)","volume":"124 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129578900","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信
小红书