2013 International Conference on Current Trends in Engineering and Technology (ICCTET)最新文献

筛选
英文 中文
Efficient channel assignment and routing in wireless mesh network 无线网状网络中有效的信道分配和路由
D. Jasmine David, V. Jagathesan
{"title":"Efficient channel assignment and routing in wireless mesh network","authors":"D. Jasmine David, V. Jagathesan","doi":"10.1109/ICCTET.2013.6675913","DOIUrl":"https://doi.org/10.1109/ICCTET.2013.6675913","url":null,"abstract":"The wireless mesh network is an emerging technology that provides high quality service to end users as the “last mile” of the Internet. Multicast communication is a key technology for wireless mesh networks. Multicast provides efficient data distribution among a group of nodes. Wireless mesh networks need to maximize throughput. Heuristic Channel Assignment algorithm that is Multichannel Multicast (MCM) algorithm to improve throughput for the multichannel mesh networks is proposed. Also a new path weight which captures the available path bandwidth information is also proposed to provide efficient routing. The available path bandwidth is defined as the maximum additional rate a flow can push before saturating its path. Therefore, if the traffic rate of a new flow on a path is no greater than the available bandwidth of this path, accepting the new traffic will not violate the bandwidth guaranteed of the existing flows. The consistency property guarantees that each node makes a proper packet forwarding decision, so that a data packet does traverse over the intended path. The extensive simulation experiments also show that the proposed Heuristic Channel Assignment with Routing provides high-throughput paths.","PeriodicalId":242568,"journal":{"name":"2013 International Conference on Current Trends in Engineering and Technology (ICCTET)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125140874","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Performance analysis of mobile sampling and broadcast scheduling in wireless sensor networks 无线传感器网络中移动采样和广播调度的性能分析
R. Rajasekar, P. Prakasam
{"title":"Performance analysis of mobile sampling and broadcast scheduling in wireless sensor networks","authors":"R. Rajasekar, P. Prakasam","doi":"10.1109/ICCTET.2013.6675964","DOIUrl":"https://doi.org/10.1109/ICCTET.2013.6675964","url":null,"abstract":"The concept of using mobile objects to gather samples from a sensor field has been not long ago proposed. Mobile objects can be used to collect models from a sensor field. Inhabitant cars and even humans geared up along with appropriate instant connection units may be used because cell basins that will reclaim sensor-data by various factors within a huge sensor subject. An essential will be the way to set up your sensor data in a fashion that will be electricity adept intended for your sensor nodes. The path of sending the sensor data is efficiently identified but consumes more cost to forward sensor data packet. Various techniques have discussed the mobile sampling and broadcast scheduling procedure for expressing a sensor node proficiently to a preferred data at a given point of time period. In this paper, the performance of the mobile sampling and broadcasting scheduling in sensor network on the basis of transmission speed, Query result precision and Deliverability is analyzed.","PeriodicalId":242568,"journal":{"name":"2013 International Conference on Current Trends in Engineering and Technology (ICCTET)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128780404","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Certain investigation on image compression technique using wavelet transform for telemedicine application 基于小波变换的图像压缩技术在远程医疗中的应用
S. Vairaprakash, A. Shenbagavalli
{"title":"Certain investigation on image compression technique using wavelet transform for telemedicine application","authors":"S. Vairaprakash, A. Shenbagavalli","doi":"10.1109/ICCTET.2013.6675981","DOIUrl":"https://doi.org/10.1109/ICCTET.2013.6675981","url":null,"abstract":"In this paper we propose on efficient region of Interest coding technique based on [1]Multiwavelet transform, set portioning in hierarchical Algorithm of Medical Images. This new method reduces the importance of Background coefficient of [2]ROI Code block without compromising algorithm complexity. By using this coding method the compressed Bit stream are all embedded and suited for progressive Transmission. Extensive experimental results show that the proposed algorithm gives better quality of images using multi wavelets transform compared to that of other scalar wavelet transforms. In this paper we took 512×512 original image. By using multiwavelet transform we decomposed the original image in various levels, then the original image is compressed in to 4:1 compression ratio and also compared the performance of proposed method with existing method. The performance of the system has been evaluated based on bits per pixel (BPP), Peak Signal To Noise Ratio(PSNR), Mean Square Error, [3] (MSE), Compression Ratio (CR), and Cross Correlation(CC).","PeriodicalId":242568,"journal":{"name":"2013 International Conference on Current Trends in Engineering and Technology (ICCTET)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122532085","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Visual quality analysis of using computer aided inspection technique 计算机辅助检测技术的视觉质量分析
J. Arun, Jaina George, J. Jaya, S. Janardhana, K. J. Sabareesaan
{"title":"Visual quality analysis of using computer aided inspection technique","authors":"J. Arun, Jaina George, J. Jaya, S. Janardhana, K. J. Sabareesaan","doi":"10.1109/ICCTET.2013.6675928","DOIUrl":"https://doi.org/10.1109/ICCTET.2013.6675928","url":null,"abstract":"This paper describes an approach for the quality inspection of chocolate. In food industry the efficiency is very important to increase the productivity. Currently, food industry has a better improvement. Indirectly, high quality food product can be exported to other countries and generates a good income. Food grading by humans are inefficient, labor intensive and prone to errors. Automated grading system not only speeds up the time of the process but also minimize error. Therefore, there is a need for an efficient food grading method to be developed. In this study, we proposed and implement methodologies and algorithms that utilize digital image processing, and analysis to determine the grade of local products. The main contribution for this study is on a design and development of an efficient algorithm for detecting and sorting the food product at more than 80% accuracy in grading compared to human expert sorting.","PeriodicalId":242568,"journal":{"name":"2013 International Conference on Current Trends in Engineering and Technology (ICCTET)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123060730","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Controlled mobility sensor networks for target tracking using particle swarm optimization 基于粒子群优化的可控移动传感器网络目标跟踪
K. Selvaraj, S. Balaji
{"title":"Controlled mobility sensor networks for target tracking using particle swarm optimization","authors":"K. Selvaraj, S. Balaji","doi":"10.1109/ICCTET.2013.6675993","DOIUrl":"https://doi.org/10.1109/ICCTET.2013.6675993","url":null,"abstract":"In Mobile Sensor Networks (MSN), it is important to manage the mobility of the nodes in order to improve the performance of the network. In Mobile Sensor Networks (MSN), due to the mobility of the nodes it is hard to detect the target during transmission. Multi target tracking for multicasting has been designed to achieve this. The packet has been multicasted using particle swarm optimization. It also supports connectivity with the increased lifetime of the network which is essential for mobile sensor networks. The proposed algorithm reduces the energy consumption of the sensors, each node is assigned one position in the way to minimize the total traveled distance of the nodes. Particle swarm optimization is a population based stochastic optimization technique. It provides a population-based search procedure and getting the best solution from the problem by taking particles and moving them around in the search space.","PeriodicalId":242568,"journal":{"name":"2013 International Conference on Current Trends in Engineering and Technology (ICCTET)","volume":"20 12","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131539842","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Design and analysis of OFDM transceiver with novel architecture 新型结构OFDM收发器的设计与分析
P. Sadhasivam, M. Manikandan
{"title":"Design and analysis of OFDM transceiver with novel architecture","authors":"P. Sadhasivam, M. Manikandan","doi":"10.1109/ICCTET.2013.6675959","DOIUrl":"https://doi.org/10.1109/ICCTET.2013.6675959","url":null,"abstract":"In this work, an analysis is performing with OFDM transceiver architecture in order to reduce the area utilization of the transceiver by introducing a new technique in computing the FFT architectures available within OFDM transceiver architecture. For prototyping circuits FPGA is better choice than using ASIC (application Specific Integrated Circuit), CUSTOM or SEMICUSTOM. FPGA implementations because avoid the Initial costs and Great development time and the inherent risks of conventional ASIC. So, in this way, the development of high advanced techniques of digital data transmission and the actual FPGA stage of integration make possible the building all the circuits that compounds a digital communication systems in an unique chip. To make use of this modern technologies of data transmission, it is necessary the development efficient techniques of digital modulation. The OFDM is the biggest utilized recently, principally, because of it use the efficient FFT to do the modulation.","PeriodicalId":242568,"journal":{"name":"2013 International Conference on Current Trends in Engineering and Technology (ICCTET)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132064537","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Illegal packet tracing and track hackers using IP traceback scheme 使用IP回溯方案跟踪非法数据包和跟踪黑客
K. Shala, G. Shenbagamoorthy
{"title":"Illegal packet tracing and track hackers using IP traceback scheme","authors":"K. Shala, G. Shenbagamoorthy","doi":"10.1109/ICCTET.2013.6675973","DOIUrl":"https://doi.org/10.1109/ICCTET.2013.6675973","url":null,"abstract":"In this paper we are tracing the origin of the fake packet. For this we are using the extended RIHT and MABS technology using. [1]Conventional block-based multicast authentication schemes overlook the heterogeneity of receivers by letting the sender choose the block size, divide a multicast stream in blocks, associate each block with a signature, and spread the effect of the signature across all the packets in the block through hash graphs or coding algorithms. The correlation among packets makes them vulnerable to packet loss, which is inherent in the Internet and wireless networks. Moreover, the lack of Denial of Service resilience renders most of them vulnerable to packet injection in hostile environments. In this paper, we propose a novel multicast authentication protocol, namely including two schemes. The basic scheme eliminates the correlation among packets and thus provides the perfect resilience to packet loss, and it is also efficient in terms of latency, computation, and communication overhead due to an efficient cryptographic primitive called batch signature, which supports the authentication of any number of packets simultaneously. We also present an [2]DSA algorithm which ensure that data is coming from admin or not.","PeriodicalId":242568,"journal":{"name":"2013 International Conference on Current Trends in Engineering and Technology (ICCTET)","volume":"2008 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122919020","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Improving fault tolerance and load balancing in Wireless Networks 提高无线网络的容错性和负载均衡
S. Rathika
{"title":"Improving fault tolerance and load balancing in Wireless Networks","authors":"S. Rathika","doi":"10.1109/ICCTET.2013.6675969","DOIUrl":"https://doi.org/10.1109/ICCTET.2013.6675969","url":null,"abstract":"In this Distributed Fault-Tolerant Quality of Wireless Networks approach they proposed EFDCB that unifies modified GDMAC and FDCB protocols and uses CFSR for QoS routing. Here in the proposed system, proposing the weighted clustering algorithm, leads to a high degree of stability in the network and improves the load balancing in [1][2]GDMAC. The load balancing is accomplished by determining a pre-defined threshold on the number of nodes that a clusterhead can cover ideally. This ensures that none of the clusterheads are overloaded at any instance of time. Moreover the stability can be accomplished by reducing the number of nodes detachmentfrom its current cluster and connect to another existing cluster. In this approach, each node is assigned weights (a real number above zero) based on its suitability of being a clusterhead. A node is chosen to be a clusterhead if its weight is higher than any of its neighbor's weight; otherwise, it joins a neighboring clusterhead. The smaller ID node id is chosen in case of a tie. The DCA makes an assumption that the network topology does not change during the execution of the algorithm. To verify the performance of the system, the nodes were assigned weights which varied linearly with their speeds but with negative slope. Results proved that the number of updates required is smaller than the [3][4]Highest-Degree and Lowest-ID heuristics. Since node weights were varied in each simulation cycle, computing the clusterheads becomes very expensive and there are no optimizations on the system parameters such as throughput and power control. The Weighted Clustering Algorithm (WCA) takes the factors into consideration and makes the selection of clusterhead and maintenance of cluster more reasonable. The factors are node degree, distance summation to all its neighboring nodes, mobility and remaining battery power respectively. And their corresponding weights are wl to w4. Besides, it converts the clustering problem into an optimization problem since an objective function is formed.","PeriodicalId":242568,"journal":{"name":"2013 International Conference on Current Trends in Engineering and Technology (ICCTET)","volume":"87 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126367947","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Maximum power point tracking of photovoltaic system using Fuzzy Logic Controller based boost converter 基于模糊控制器的升压变换器的光伏系统最大功率点跟踪
S. Sreekumar, A. Benny
{"title":"Maximum power point tracking of photovoltaic system using Fuzzy Logic Controller based boost converter","authors":"S. Sreekumar, A. Benny","doi":"10.1109/ICCTET.2013.6675965","DOIUrl":"https://doi.org/10.1109/ICCTET.2013.6675965","url":null,"abstract":"Recently, the energy crisis in the world has led to the rise in use of renewable energy sources. With the advancement in power electronics technology, the solar photovoltaic energy has been recognized as an important renewable energy resource because it is clean, abundant and pollution free. The efficiency of the photovoltaic system may be increased by using Maximum Power Point Tracker (MPPT). A number of algorithms are developed to track the maximum power point efficiently. Most of the existing MPPT algorithms suffer from the drawback of being slow or wrong tracking. Introduction of intelligent MPPTs in PV systems is very promising. The current paper proposes an intelligent control method for the maximum power point tracking (MPPT) of a photovoltaic system under variable insolation conditions. Here in this paper, intelligent control method uses a Fuzzy Logic Controller applied to a DC-DC converter device. The result is compared with the results obtained by using P&O method. The effectiveness of proposed algorithm is validated by simulation using Matlab/Simulink and is compared to those obtained by the conventional methods. The result shows that the fuzzy logic controller exhibits a better performance compared to that of conventional method.","PeriodicalId":242568,"journal":{"name":"2013 International Conference on Current Trends in Engineering and Technology (ICCTET)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121176485","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
Thresholding approaches for extracting optic disc in digital fundus image 数字眼底图像视盘提取的阈值方法
N. Thulasi, K. Sikamani
{"title":"Thresholding approaches for extracting optic disc in digital fundus image","authors":"N. Thulasi, K. Sikamani","doi":"10.1109/ICCTET.2013.6675945","DOIUrl":"https://doi.org/10.1109/ICCTET.2013.6675945","url":null,"abstract":"In this paper, thresholding approaches are analyzed to locate the optic disc in colour fundus image. The approaches used in the system are the well known Otsu thresholding and iterative thresholding technique. As green plane in the fundus image provides best contrast, it is used to extract the Region of Interest (ROI). Before extracting ROI, it is necessary to de-noise the image. Median filtering is applied for this purpose. Then ROI is extracted based on the intensity value of the optic disc. To locate the optic disc region Otsu and iterative techniques are applied. Results show that the location of optic disc identified by iterative thresholding technique is better than the Otsu method.","PeriodicalId":242568,"journal":{"name":"2013 International Conference on Current Trends in Engineering and Technology (ICCTET)","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126042839","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信