2012 Third International Conference on Computer and Communication Technology最新文献

筛选
英文 中文
Ensuring Security in On-demand File Replication System 确保按需文件复制系统的安全性
2012 Third International Conference on Computer and Communication Technology Pub Date : 2012-11-23 DOI: 10.1109/ICCCT.2012.70
D. Bajpai, M. Vardhan, D. S. Kushwaha
{"title":"Ensuring Security in On-demand File Replication System","authors":"D. Bajpai, M. Vardhan, D. S. Kushwaha","doi":"10.1109/ICCCT.2012.70","DOIUrl":"https://doi.org/10.1109/ICCCT.2012.70","url":null,"abstract":"File replication in distributed environment has been discussed by many researchers, but the issues like confidentiality and integrity of files during replication are rarely focused, when deployed in the cloud environment. Distributed computing started with the cluster followed by the grid and is now era of cloud computing, where most of the services are accessed, by few clicks. In cloud, services are invoked on demand and there is no need of dedicated resources. It demands the availability of resources (i.e. logical resources), in order to fulfil the user requirements. To make this feasible, on-demand availability of Logical Resources (LR) is preferred. This work proposes security mechanisms to fully secure the on-demand logical resource (file) replication scheme through the use of symmetric and asymmetric keys as they are required for fulfilling the confidentially, integrity, availability requirements of the system efficiently. It is also responsible for replicating the file, from one peer server to the other peer server, having the trust level above the predefined threshold value.","PeriodicalId":235770,"journal":{"name":"2012 Third International Conference on Computer and Communication Technology","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126058414","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Analysis of F-Shape Microstrip Line Fed Antenna for Dualband Operations 用于双频工作的f形微带馈线天线分析
2012 Third International Conference on Computer and Communication Technology Pub Date : 2012-11-23 DOI: 10.1109/ICCCT.2012.51
Ashutosh Kumar Singh, J. A. Ansari, K. Kamakshi, A. Mishra, M. Aneesh
{"title":"Analysis of F-Shape Microstrip Line Fed Antenna for Dualband Operations","authors":"Ashutosh Kumar Singh, J. A. Ansari, K. Kamakshi, A. Mishra, M. Aneesh","doi":"10.1109/ICCCT.2012.51","DOIUrl":"https://doi.org/10.1109/ICCCT.2012.51","url":null,"abstract":"An analysis of F-shape micro strip line fed dual band monopole antenna is presented and investigated theoretical using circuit theory concept. The resonance frequency is found to be 2.4 GHz and 5.2 GHz, and the bandwidth of the proposed antenna for lower and upper resonance frequency is found to be 20.08% and 5.93% (simulated), as well as 17.05% and 5.78% (theoretical) respectively. Effect of varying antenna dimension and dielectric constant optimized to obtained dual band operation. The theoretical results are compared with IE3D simulation software as well as reported experimental results, and they are in good agreement.","PeriodicalId":235770,"journal":{"name":"2012 Third International Conference on Computer and Communication Technology","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130542578","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Fox-Hole Model for Data-centric Misbehaviour Detection in VANETs VANETs中以数据为中心的错误行为检测的狐洞模型
2012 Third International Conference on Computer and Communication Technology Pub Date : 2012-11-23 DOI: 10.1109/ICCCT.2012.62
S. Harit, G. Singh, N. Tyagi
{"title":"Fox-Hole Model for Data-centric Misbehaviour Detection in VANETs","authors":"S. Harit, G. Singh, N. Tyagi","doi":"10.1109/ICCCT.2012.62","DOIUrl":"https://doi.org/10.1109/ICCCT.2012.62","url":null,"abstract":"Broadcasting false traffic information in VANETs is one of the major security concerns. Detecting false data sent by misbehaving nodes has been a major challenge in recent times. In this paper, we are going to present a simple scheme for detection of correctness of information regarding happening of an event like a road crash. It uses the data collected from the movement of other vehicles on the road who can observe the event and measuring their response towards it. Our misbehaviour detection scheme (MDS) is data-centric meaning it figures out whether the information received is true. Vehicles may send false information just to gain access to a whole lane in a congested area. For fast moving traffic, it thus becomes more important to find the truth-value of a broadcasted alert rather than exactly finding the misbehaving node. Our scheme is not based upon voting but observing the actual movement of nodes in response to the detected event. After describing the model in detail and the mathematical equation behind the MDS, we will present certain scenarios as a justification of our scheme. At the end, we will highlight the advantages and certain limitations of our MDS as a comparative study.","PeriodicalId":235770,"journal":{"name":"2012 Third International Conference on Computer and Communication Technology","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121935871","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 28
VLSI Architecture for Spread Spectrum Image Watermarking in Walsh-Hadamard Transform Domain Using Binary Watermark 基于二进制水印的Walsh-Hadamard变换域扩频图像水印的VLSI架构
2012 Third International Conference on Computer and Communication Technology Pub Date : 2012-11-23 DOI: 10.1109/ICCCT.2012.54
S. Ghosh, S. Talapatra, S. Chakraborty, N. Chatterjee, H. Rahaman, S. Maity
{"title":"VLSI Architecture for Spread Spectrum Image Watermarking in Walsh-Hadamard Transform Domain Using Binary Watermark","authors":"S. Ghosh, S. Talapatra, S. Chakraborty, N. Chatterjee, H. Rahaman, S. Maity","doi":"10.1109/ICCCT.2012.54","DOIUrl":"https://doi.org/10.1109/ICCCT.2012.54","url":null,"abstract":"Spread-spectrum communication encompasses a number of signalling techniques in which the transmitted bandwidth is significantly larger than required by the data rate and the transmitted bandwidth is determined by a function independent of the message that is known to both sender and receiver. Originally intended to increase resistance to jamming and lowering the probability of interception, its properties are also desirable in a number of other applications and have been applied to the problem of digital watermarking. In this paper we have a transform domain Spread Spectrum (SS) watermarking scheme which effectively eliminates security problem while increasing robustness and enhancing perceptual quality of watermarked image. VLSI implementation using Field Programmable Gate Array (FPGA) has been developed for the proposed watermarking algorithm which becomes a solution for real-time implementation.","PeriodicalId":235770,"journal":{"name":"2012 Third International Conference on Computer and Communication Technology","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132459785","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Design of a Microstrip Line Fed Slotted Patch Antenna for Wideband Communications 宽带通信微带馈线开槽贴片天线的设计
2012 Third International Conference on Computer and Communication Technology Pub Date : 2012-11-23 DOI: 10.1109/ICCCT.2012.43
R. Kushwaha, D. Srivastava, J. Saini, S. Dhupkariya
{"title":"Design of a Microstrip Line Fed Slotted Patch Antenna for Wideband Communications","authors":"R. Kushwaha, D. Srivastava, J. Saini, S. Dhupkariya","doi":"10.1109/ICCCT.2012.43","DOIUrl":"https://doi.org/10.1109/ICCCT.2012.43","url":null,"abstract":"A very compact, high efficiency and simple micro strip patch antenna for wideband applications is presented in this communication. The design employs a slotted rectangular patch fed by a 50 ? micro strip line. The bandwidth is increased by cutting some rectangular slits on the ground plane. The antenna is designed on a small size ground plane (25 mm x 30 mm) and is simulated by a full wave electromagnetic simulator IE3D, a software package of Zeland. The impedance bandwidth at-10 dB return loss for the proposed antenna is about 35% (3.8 to 5.4 GHz) with center frequency at 4.54 GHz.","PeriodicalId":235770,"journal":{"name":"2012 Third International Conference on Computer and Communication Technology","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133450507","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Reduced Variable Neighbourhood Search for Pagenumber Minimization Problem 页数最小化问题的减变量邻域搜索
2012 Third International Conference on Computer and Communication Technology Pub Date : 2012-11-23 DOI: 10.1109/ICCCT.2012.27
D. Satsangi, K. Srivastava, G. Gursaran
{"title":"Reduced Variable Neighbourhood Search for Pagenumber Minimization Problem","authors":"D. Satsangi, K. Srivastava, G. Gursaran","doi":"10.1109/ICCCT.2012.27","DOIUrl":"https://doi.org/10.1109/ICCCT.2012.27","url":null,"abstract":"In this paper we apply reduced variable neighbourhood search (RVNS) to the page number minimization problem (PNP). In RVNS, random depth first search of the graph is used for placing the vertices on the spine and three edge embedding heuristics are used to distribute the edges on a minimal number of pages. The results show that the algorithm achieves the optimal page number for most of the standard graphs tested by us. RVNS performance is also compared with the genetic algorithm and hybrid evolutionary algorithm present in the literature on select instances of standard and random graphs. It is observed that RVNS gives better solutions for random instances. Extensive experiments were carried out on classes of graphs with known results/upper bounds. Optimal values were achieved by RVNS for all the graphs tested and substantially lower values were obtained for the graphs with known upper bounds of page number. The main contribution of the paper are some Harwell-Boeing Sparse Matrix Collection graphs and cartesian product of complete graphs with unknown page numbers.","PeriodicalId":235770,"journal":{"name":"2012 Third International Conference on Computer and Communication Technology","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124051022","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Compression Technique Based on Optimality of LZW Code (OLZW) 基于LZW码最优性的压缩技术(OLZW)
2012 Third International Conference on Computer and Communication Technology Pub Date : 2012-11-23 DOI: 10.1109/ICCCT.2012.40
U. Nandi, J. K. Mandal
{"title":"A Compression Technique Based on Optimality of LZW Code (OLZW)","authors":"U. Nandi, J. K. Mandal","doi":"10.1109/ICCCT.2012.40","DOIUrl":"https://doi.org/10.1109/ICCCT.2012.40","url":null,"abstract":"A loss less dictionary based data compression technique has been proposed in this paper which is based on the optimality of LZW code. The compression process is started with empty dictionary and if the next symbol to be encoded is already in dictionary, length of symbol code is determined by the highest symbol code in the dictionary and encoded with the code in the dictionary. Otherwise, the symbol is encoded with 8-bit ASCII code. Some of the limitations of LZW compression technique have been eliminated in the proposed compression technique. Comparisons are made between proposed technique and two different version of LZW data compression technique which shows that the proposed technique works well for small size files particularly.","PeriodicalId":235770,"journal":{"name":"2012 Third International Conference on Computer and Communication Technology","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121236277","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 31
User Centric Retrieval of Learning Objects in LMS LMS中以用户为中心的学习对象检索
2012 Third International Conference on Computer and Communication Technology Pub Date : 2012-11-23 DOI: 10.1109/ICCCT.2012.13
S. Sabitha, D. Mehrotra
{"title":"User Centric Retrieval of Learning Objects in LMS","authors":"S. Sabitha, D. Mehrotra","doi":"10.1109/ICCCT.2012.13","DOIUrl":"https://doi.org/10.1109/ICCCT.2012.13","url":null,"abstract":"Research and Academic Institutions own and archive a great number of documents like lesson plan, study material and research related resources, which are needed to be stored and used over for a longer period of time by lecturers and researchers. In order to achieve this it is required to convert these educational resources into Learning Objects and store them in structured & meaningful way via a learning management system (LMS) thus enriching classical teaching. Also with enhancement of e-learning environment there is a great need of managing the LMS repositories by storing information resources as Learning object, a digital entity which can be used in electronic learning environment. These learning objects are stored in repositories and are managed by Learning Management Systems. It aids teaching and learning process and helps in communications between users. Many designs of LMS are non user-centric and has limited capabilities in delivering user preferred learning material. Searching through keywords or metadata of learning material will result in display of huge quantity of information. Thus there is an earnest need to identify the techniques that can provide more efficient mechanism for information retrieval. Recommendation techniques have shown to be successful in many domains (e.g. movies, books, music, etc.). Thus there is a need to deploy a recommending system in the E-Learning domain to extend the functionality of standard-based learning management systems with providing the user based retrieval. In this paper a model is being proposed that can enhance the search and delivery of a relevant learning object based on his/her preferences and further ranking & clustering of learning objects are done through K-Mean and Self Organising Maps for a personalised learning environment.","PeriodicalId":235770,"journal":{"name":"2012 Third International Conference on Computer and Communication Technology","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125424263","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 21
Comparative Study of Phoneme Recognition Techniques 音素识别技术的比较研究
2012 Third International Conference on Computer and Communication Technology Pub Date : 2012-11-23 DOI: 10.1109/ICCCT.2012.28
A. Kshirsagar, A. Dighe, K. Nagar, M. Patidar
{"title":"Comparative Study of Phoneme Recognition Techniques","authors":"A. Kshirsagar, A. Dighe, K. Nagar, M. Patidar","doi":"10.1109/ICCCT.2012.28","DOIUrl":"https://doi.org/10.1109/ICCCT.2012.28","url":null,"abstract":"Automatic Speech Recognition is the most popular and demanding field in the research area. For most of the real world applications, Phoneme recognition is important for successful development of ASR. This Paper gives an overview of the techniques and systems for the Phoneme recognition based on three categories-Vector Quantization, HMM, Neural Network followed by comparative study of different techniques. This paper helps in selecting the appropriate technique along with its feature description. Also gives the generalized approach of the phoneme recognition technique to understand their working. This paper concludes with the decision that the present phoneme recognition techniques work better for isolated words then continues speech.","PeriodicalId":235770,"journal":{"name":"2012 Third International Conference on Computer and Communication Technology","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132508648","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Service Oriented Framework for Business Objectives 面向服务的业务目标框架
2012 Third International Conference on Computer and Communication Technology Pub Date : 2012-11-23 DOI: 10.1109/ICCCT.2012.36
A. Seth, H. Aggarwal, A. R. Singla
{"title":"Service Oriented Framework for Business Objectives","authors":"A. Seth, H. Aggarwal, A. R. Singla","doi":"10.1109/ICCCT.2012.36","DOIUrl":"https://doi.org/10.1109/ICCCT.2012.36","url":null,"abstract":"This paper articulates a way of using unified modelling language (UML) to develop SCM, CRM and other business value chain activities for any SME, our focus is to emphasize on the interfaces of systems. The results show that the UML was useful in the development of information systems. The main objective of this work is to create a functional service-oriented system for ERP, CRM and SCM to share its own services (functionalities) to each other within an application domain.","PeriodicalId":235770,"journal":{"name":"2012 Third International Conference on Computer and Communication Technology","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133760532","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信