2012 Third International Conference on Computer and Communication Technology最新文献

筛选
英文 中文
Dynamic Crosstalk Analysis in RLC Modeled Interconnects Using FDTD Method 用FDTD方法分析RLC模型互连中的动态串扰
2012 Third International Conference on Computer and Communication Technology Pub Date : 2012-11-23 DOI: 10.1109/ICCCT.2012.72
D. Sharma, S. Mittal, B. Kaushik, Ranjan Sharma, K. Yadav, M. Majumder
{"title":"Dynamic Crosstalk Analysis in RLC Modeled Interconnects Using FDTD Method","authors":"D. Sharma, S. Mittal, B. Kaushik, Ranjan Sharma, K. Yadav, M. Majumder","doi":"10.1109/ICCCT.2012.72","DOIUrl":"https://doi.org/10.1109/ICCCT.2012.72","url":null,"abstract":"Accurate time domain analysis and cross talk estimation in VLSI interconnects has emerged as an essential design criteria. This paper presents the description of a finite difference time domain (FDTD) method that is intended for estimation of voltages and currents on coupled transmission line. A numerical method based on FDTD is opted for the estimation of cross talk induced time delay in lossy RLC interconnects. Both functional and dynamic cross talk effects in coupled line configuration are analyzed. Effect of line resistance on delay is also evaluated. A linear resistive driver is used to drive distributed RLC transmission line for lossy interconnect. It has been observed that the analytical results for proposed FDTD model are in good agreement with HSPICE simulation results. The proposed model using FDTD results in an average error of 4.1% with respect to HSPICE.","PeriodicalId":235770,"journal":{"name":"2012 Third International Conference on Computer and Communication Technology","volume":"78 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129748081","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
SRS Based Estimation of Software Maintenance Effort 基于SRS的软件维护工作量评估
2012 Third International Conference on Computer and Communication Technology Pub Date : 2012-11-23 DOI: 10.1109/ICCCT.2012.38
Alpika Tripathi, B. Kumar, A. Sharma, D. S. Kushwaha
{"title":"SRS Based Estimation of Software Maintenance Effort","authors":"Alpika Tripathi, B. Kumar, A. Sharma, D. S. Kushwaha","doi":"10.1109/ICCCT.2012.38","DOIUrl":"https://doi.org/10.1109/ICCCT.2012.38","url":null,"abstract":"Software maintenance effort estimation has always been a challenge for the software practitioners, as it consumes about half of the overall development costs. The effort required to develop or maintain software depend on the complexity of yet to be developed software. The proposed measure estimates the requirement-based complexity based on SRS document of yet to be developed software for systematic and early prediction of software maintenance effort using Software Requirements Specifications (SRS) document of the proposed software. The result obtained validates that, the proposed maintenance measure is a comprehensive one and compares well with various other prevalent measures proposed in the past. The computation of proposed maintenance effort estimation involves least overhead as compared to others.","PeriodicalId":235770,"journal":{"name":"2012 Third International Conference on Computer and Communication Technology","volume":"119 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129255688","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
New Time Error Estimation Technique for OFDM System OFDM系统时间误差估计新技术
2012 Third International Conference on Computer and Communication Technology Pub Date : 2012-11-23 DOI: 10.1109/ICCCT.2012.19
A. P. Rathkanthiwar, A. Gandhi
{"title":"New Time Error Estimation Technique for OFDM System","authors":"A. P. Rathkanthiwar, A. Gandhi","doi":"10.1109/ICCCT.2012.19","DOIUrl":"https://doi.org/10.1109/ICCCT.2012.19","url":null,"abstract":"OFDM based systems are extremely sensitive to time and frequency synchronization errors. This paper addresses the issue of time synchronization. In this paper we are presenting a simple and novel technique for time synchronization. The time synchronization error causes Inter Symbol Interference and hence must be corrected at receiver. In many wireless communication systems, the data packets or frame start with the preamble called training symbol followed by data symbols. The training symbol consists of some specific pattern. The similar frame structure is used for this new algorithm which consists of training symbol followed by OFDM data symbols. This novel technique uses new pattern for training symbol which consists of all identical samples. After applying our new algorithm, a peak is obtained at the end of training symbol. This is used to mark beginning of frame and estimation of timing error. Estimation error graph and BER graph are presented for 4QAM and 16 QAM in this paper. The results are shown for AWGN channel. The technique used is simple and results are encouraging and can be used in any of the OFDM based system.","PeriodicalId":235770,"journal":{"name":"2012 Third International Conference on Computer and Communication Technology","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126152972","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Enhanced Mobile SET Protocol with Formal Verification 具有正式验证的增强移动SET协议
2012 Third International Conference on Computer and Communication Technology Pub Date : 2012-11-23 DOI: 10.1109/ICCCT.2012.65
S. Ahamad, N. Sastry, S. Udgata
{"title":"Enhanced Mobile SET Protocol with Formal Verification","authors":"S. Ahamad, N. Sastry, S. Udgata","doi":"10.1109/ICCCT.2012.65","DOIUrl":"https://doi.org/10.1109/ICCCT.2012.65","url":null,"abstract":"In this paper we propose an Enhanced Mobile SET (EMSET) protocol with formal verification using Mobile Agent technology and Digital Signature with Message Recovery based on ECDSA mechanism. Mobile Agent technology and Digital Signature with Message Recovery (DSMR) based on ECDSA mechanism provides in proposing EMSET protocol in Mobile Networks. Mobile Agent technology has many benefits such as bandwidth conservation, reduction of latency, reduction of completion time, Asynchronous (disconnected) communications. Digital Signature with Message Recovery based on ECDSA eliminates the need of adopting PKI cryptosystems. Our proposed protocol EMSET ensures Authentication, Integrity, Confidentiality and Non Repudiation, achieves Identity protection from merchant and Eavesdropper, achieves Transaction privacy from Eavesdropper and Payment Gateway, achieves Payment Secrecy, Order Secrecy, forward secrecy, and prevents Double Spending, Overspending and Money laundering. In addition to these our proposed protocol withstands Replay, Man in the Middle and Impersonation attacks. The security properties of the proposed protocol have been verified using Scyther Tool and presented with results.","PeriodicalId":235770,"journal":{"name":"2012 Third International Conference on Computer and Communication Technology","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128670807","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Privacy Preserving Data Mining Techniques: Current Scenario and Future Prospects 隐私保护数据挖掘技术:现状与未来展望
2012 Third International Conference on Computer and Communication Technology Pub Date : 2012-11-23 DOI: 10.1109/ICCCT.2012.15
Majid Bashir, Malik, M. A. Ghazi, Rashid Ali
{"title":"Privacy Preserving Data Mining Techniques: Current Scenario and Future Prospects","authors":"Majid Bashir, Malik, M. A. Ghazi, Rashid Ali","doi":"10.1109/ICCCT.2012.15","DOIUrl":"https://doi.org/10.1109/ICCCT.2012.15","url":null,"abstract":"Privacy preserving has originated as an important concern with reference to the success of the data mining. Privacy preserving data mining (PPDM) deals with protecting the privacy of individual data or sensitive knowledge without sacrificing the utility of the data. People have become well aware of the privacy intrusions on their personal data and are very reluctant to share their sensitive information. This may lead to the inadvertent results of the data mining. Within the constraints of privacy, several methods have been proposed but still this branch of research is in its infancy. The success of privacy preserving data mining algorithms is measured in terms of its performance, data utility, level of uncertainty or resistance to data mining algorithms etc. However no privacy preserving algorithm exists that outperforms all others on all possible criteria. Rather, an algorithm may perform better than another on one specific criterion. So, the aim of this paper is to present current scenario of privacy preserving data mining tools and techniques and propose some future research directions.","PeriodicalId":235770,"journal":{"name":"2012 Third International Conference on Computer and Communication Technology","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128092996","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 151
Performance Analysis of Black Hole Attack on WiMAX-WLAN Interface Network WiMAX-WLAN接口网络黑洞攻击性能分析
2012 Third International Conference on Computer and Communication Technology Pub Date : 2012-11-23 DOI: 10.1109/ICCCT.2012.68
R. Jha, U. Dalal, Idris Z. Bholebawa
{"title":"Performance Analysis of Black Hole Attack on WiMAX-WLAN Interface Network","authors":"R. Jha, U. Dalal, Idris Z. Bholebawa","doi":"10.1109/ICCCT.2012.68","DOIUrl":"https://doi.org/10.1109/ICCCT.2012.68","url":null,"abstract":"In this paper, we have observed that the performance analysis of one of the most challenging security issue for wireless network i.e. Black hole attack. WiMAX-WLAN interface will play a important role in the NGN (Next generation Network) scenario. This attack is possible in WiMAX-WLAN interface network i.e. in current scenarios. In this paper we analyzed the performance analysis of Performance Analysis of Black Hole Attack on WiMAX-WLAN Interface Network. In this type of attack an intruder is a malicious node with less buffer size moving on its defined trajectory and passing from WiMAX-WLAN converter. In black hole attack, a malicious node uses its routing protocol in order to advertise itself for having the shortest path to the destination node or to the packet it wants to intercept. This aggressive node advertises its availability of fresh routes irrespective of checking its routing table. In this technique attacker node will always have the accessibility in replying to the route request and thus intercept the data packet and retain it.","PeriodicalId":235770,"journal":{"name":"2012 Third International Conference on Computer and Communication Technology","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128239873","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Demand Based File Replication and Consistency Mechanism 基于需求的文件复制和一致性机制
2012 Third International Conference on Computer and Communication Technology Pub Date : 2012-11-23 DOI: 10.1109/ICCCT.2012.74
M. Vardhan, A. Goel, A. Verma, D. S. Kushwaha
{"title":"Demand Based File Replication and Consistency Mechanism","authors":"M. Vardhan, A. Goel, A. Verma, D. S. Kushwaha","doi":"10.1109/ICCCT.2012.74","DOIUrl":"https://doi.org/10.1109/ICCCT.2012.74","url":null,"abstract":"File replication and consistency are well known techniques in distributed systems to address the key issues such as scalability, reliability and fault tolerance. For many years, file replication and consistency in distributed environment has been researched to enhance and optimize the availability and reliability of the entire system. An effort has been made in the present work to propose a file popularity based, adaptive, on demand, reliable and comprehensive file replication and consistency mechanism. This paper introduces a group of File Replication Servers (FRS) that is responsible for ensuring the file availability, in order to fulfill the file request. The present work proposes Hybrid file update propagation mechanism so as to minimize the number of updates. Proposed model replicates the file, from one node to the other node, when the total number of request for a particular file reaches a threshold value. Proposed approach is implemented on JAVA platform. Based on the file popularity, model creates and updates the file replica on the server. The proposed Hybrid approach is compared with write invalidate and write update propagation policies. Comparison results show that for balanced load hybrid file update propagation model updates the optimum number of replicas. Whereas, for unbalanced load, hybrid approach outperforms other two approaches by handling all the file requests with minimum number of updates.","PeriodicalId":235770,"journal":{"name":"2012 Third International Conference on Computer and Communication Technology","volume":"79 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132938466","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Speaker Recognition 说话人识别
2012 Third International Conference on Computer and Communication Technology Pub Date : 2012-11-23 DOI: 10.1109/ICCCT.2012.64
Supriya Tripathi, Smriti Bhatnagar
{"title":"Speaker Recognition","authors":"Supriya Tripathi, Smriti Bhatnagar","doi":"10.1109/ICCCT.2012.64","DOIUrl":"https://doi.org/10.1109/ICCCT.2012.64","url":null,"abstract":"Speech processing has emerged as one of the important application area of digital signal processing. The objective of automatic speaker recognition is to extract, characterize and recognize the information about speaker identity. This paper proposes the comparison of the MFCC and the Vector Quantisation technique for speaker recognition. Feature vectors from speech are extracted by using Mel-frequency cepstral coefficients which carry the speaker's identity characteristics and vector quantization technique is implemented through Linde-Buzo-Gray algorithm. Vector quantization uses a codebook to characterize the short-time spectral coefficients of a speaker. These coefficients are used to identify an unknown speaker from a given set of speakers. The effectiveness of these methods is examined from the viewpoint of robustness against utterance variation such as differences in content, temporal variation, and changes in utterance speed.","PeriodicalId":235770,"journal":{"name":"2012 Third International Conference on Computer and Communication Technology","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133612534","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Development of Cost Effective EMG Controlled Three Fingered Robotic Hand 具有成本效益的肌电控制三指机械手的研制
2012 Third International Conference on Computer and Communication Technology Pub Date : 2012-11-23 DOI: 10.1109/ICCCT.2012.29
S. Choudhary, D. Chakraborty, N. M. Kakoty, S. Hazarika
{"title":"Development of Cost Effective EMG Controlled Three Fingered Robotic Hand","authors":"S. Choudhary, D. Chakraborty, N. M. Kakoty, S. Hazarika","doi":"10.1109/ICCCT.2012.29","DOIUrl":"https://doi.org/10.1109/ICCCT.2012.29","url":null,"abstract":"One of the major problems confronted in the development of robotic hand prostheses is the achievement of electromyogram (EMG) based control in terms of grasping adaptability. Moreover prosthetic hands that have appeared in the market are out of the reach of common people because of high cost. In this paper, we report the development and control of a three fingered robotic hand motivated by these facts. The developed hand possess six degrees of freedom and can grasp oval, cuboid, circular and cylindrical objects with self adaptability. A grasp planner based on EMG signals commands the controller for actuating the hand opening and closing. In the grasp planner, a fuzzy classifier recognizes shoulder abduction and adduction based on the root mean square value of EMG. The control is through a proportional controller customized with position and touch sensors. The envisaged cost of the proposed hand would be appreciably low compared to most of the hands available in the market.","PeriodicalId":235770,"journal":{"name":"2012 Third International Conference on Computer and Communication Technology","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128339748","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Optimization of 2x2 Mach-Zehnder Interferometer Electro-Optic Switch 2 × 2马赫-曾德尔干涉仪电光开关的优化
2012 Third International Conference on Computer and Communication Technology Pub Date : 2012-11-23 DOI: 10.1109/ICCCT.2012.41
K. Jain, R. Mehra, H. K. Dixit
{"title":"Optimization of 2x2 Mach-Zehnder Interferometer Electro-Optic Switch","authors":"K. Jain, R. Mehra, H. K. Dixit","doi":"10.1109/ICCCT.2012.41","DOIUrl":"https://doi.org/10.1109/ICCCT.2012.41","url":null,"abstract":"This paper presents enhanced performance of a 2x2 optoelectronic switch based on Mach-Zehnder Interferometer made by titanium diffusion in lithium niobate substrate. The electro-optic switches have wide application in next generation optical networks due to their high speed operation. The optimization of switching characteristics is performed for low switching losses such as insertion loss, excess loss, high extinction ratio and low switching voltage by varying the gap of 3dB couplers, gap of interferometric arms and wave guide width. The present structure has been optimized in order to reduce the overall switch losses (= 0.1 dB) and to achieve the best possible extinction ratio (≥ 20 dB). Further by changing wave guide width the switching voltage is reduced from 7.8 V to 7.4 V.","PeriodicalId":235770,"journal":{"name":"2012 Third International Conference on Computer and Communication Technology","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115482253","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信