{"title":"Workshops and tutorials","authors":"Shrikant Satyanarayan","doi":"10.1109/coase.2010.5584363","DOIUrl":"https://doi.org/10.1109/coase.2010.5584363","url":null,"abstract":"For more than forty years, LDRA has developed and driven the market for software that automates code analysis and software testing for safety-, mission-, securityand businesscritical markets. Working with clients to achieve early error identification and full compliance with industry standards, LDRA traces requirements through static and dynamic analysis to unit testing and verification for a wide variety of hardware and software platforms. Boasting a worldwide presence, LDRA is headquartered in the UK with subsidiaries in the United States, India and an extensive distributor network.","PeriodicalId":244242,"journal":{"name":"2014 International Conference on Computer Communication and Informatics","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133242285","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"RBIR based on signature graph","authors":"Thanh The Van, T. Le","doi":"10.1109/ICCCI.2014.6921760","DOIUrl":"https://doi.org/10.1109/ICCCI.2014.6921760","url":null,"abstract":"This paper approaches the image retrieval system on the base of visual features local region RBIR (region-based image retrieval). First of all, the paper presents a method for extracting the interest points based on Harris-Laplace to create the feature region of the image. Next, in order to reduce the storage space and speed up query image, the paper builds the binary signature structure to describe the visual content of image. Based on the image's binary signature, the paper builds the SG (signature graph) to classify and store image's binary signatures. Since then, the paper builds the image retrieval algorithm on SG through the similar measure EMD (earth mover's distance) between the image's binary signatures. Last but not least, the paper gives an image retrieval model RBIR, experiments and assesses the image retrieval method on Corel image database over 10,000 images.","PeriodicalId":244242,"journal":{"name":"2014 International Conference on Computer Communication and Informatics","volume":"73 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-07-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128849069","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Effective capacity of delay quality-of-service guarantees with imperfect channel information in spectrum-sharing environment","authors":"Xiangqun Shi, Qingxin Chu","doi":"10.1109/ICCCI.2014.6921813","DOIUrl":"https://doi.org/10.1109/ICCCI.2014.6921813","url":null,"abstract":"This paper considers a spectrum-sharing cognitive network in which a secondary user shares spectrum with an existing primary user as long as the interference caused by the secondary user to the primary user is below permissible levels. We investigate the delay quality-of-service (QoS) guaranteed capacity gains with imperfect channel state information (CSI) between the secondary transmitter and the primary receiver in Rayleigh fading environments. In particular, we quantify the relations between the effective capacity of secondary user and the interference on the primary user. The impacts of channel estimation error on the performance of the secondary user are studied. Our results indicate channel estimation errors, especially in the smaller value range, lead to considerably degradation of capacity gains for the looser delay QoS requirements. Numerical simulations are conducted to corroborate our theoretical analysis.","PeriodicalId":244242,"journal":{"name":"2014 International Conference on Computer Communication and Informatics","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124999605","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"IP-based connection between mobile phones","authors":"J. Patel","doi":"10.1109/ICCCI.2014.6921801","DOIUrl":"https://doi.org/10.1109/ICCCI.2014.6921801","url":null,"abstract":"This paper gives an explanatorily idea of connecting mobile phones in a same WIFI system using WLAN(Wireless Local Area Network) Access Point(AP) or P2P(Peer-to-Peer) connection system. By using this IP based local connection system, mobile phone users can share files, photos, send messages and even call other mobile device free of cost. The system will also have a feature to automatically detect if other user is is not in the specified WIFI range and opts the user to connect via standard GSM/CDMA/3G service providers.","PeriodicalId":244242,"journal":{"name":"2014 International Conference on Computer Communication and Informatics","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125363740","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Performance analysis of enhanced DRX mechanism in LTE networks","authors":"A. Rajesh, R. Nakkeeran","doi":"10.1109/ICCCI.2014.6921789","DOIUrl":"https://doi.org/10.1109/ICCCI.2014.6921789","url":null,"abstract":"Power management mechanism in Long Term Evolution (LTE) networks depends on the interval and position of the short Discontinuous Reception (DRX) period, long DRX period and ON duration of DRX. The proposal made in this paper is twofold. First, the sleep duration and periods are computed based on the minimum delay and power requirements of the User Equipment (UE). These values are usually kept as fixed in the existing power saving modes. Second, various power saving patterns are proposed by combining the short DRX and long DRX cycles. The existing pattern suffers from high response delay with large power consumption during power saving mode. The delay and energy consumption of the DRX operation is studied by varying the interarrival time at UE. It is observed that the response delay and the energy consumption is reduced by 5.35% and 47.14%, respectively, in square and rectangular patterns than existing hybrid pattern.","PeriodicalId":244242,"journal":{"name":"2014 International Conference on Computer Communication and Informatics","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129261695","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Comparative analysis on routing protocols in Wireless Sensor Networks","authors":"T. Gnanasekaran, Sharmila Anand John Francis","doi":"10.1109/ICCCI.2014.6921777","DOIUrl":"https://doi.org/10.1109/ICCCI.2014.6921777","url":null,"abstract":"A Wireless Sensor Network consists of sensor nodes distributed over the region that communicate among them through the wireless medium. Wireless Sensor Network must be managed automatically with minimum number of human intervention and changes its state by maintaining its quality. The important feature of sensor network is the data collection. Each sensor node has the ability to gather information, analyze that information and route them to a designated location. Routing algorithm plays a major role in routing the packets to the sink point. A survey of routing protocols has done in this paper using various performance metrics viz, energy consumption, data aggregation, scalability, computation overhead, data delivery model, network lifetime, optimal route of the wireless sensor networks.","PeriodicalId":244242,"journal":{"name":"2014 International Conference on Computer Communication and Informatics","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126572438","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Design of a MEMS comb resonator for above 15 KHz with its effective mass of resonant structure less than 30 nanogram using MEMS CAD","authors":"S. Manikandan, R. R. Krishna","doi":"10.1109/ICCCI.2014.6921820","DOIUrl":"https://doi.org/10.1109/ICCCI.2014.6921820","url":null,"abstract":"In a comb resonator the spring mass and dynamic mass is the parameter for generating resonant frequency and the resonance frequency of above 15 KHz is the main challenge for applications like accelerometer, oscillator and gyros. The electrostatic force helps in the generation of resonant frequency and created between the two electrodes for actuation and sensing making it two port resonator. This paper presents deals with design of computing spring constant for support is 0.355N/m and we obtained the effective mass of the structure as 24.1 nanogram. Also the resonant frequency as 19.29 KHz. Also checked the effect of capacitance for the input. Also we considered the inclination of comb fingers and its relative effects on the design.","PeriodicalId":244242,"journal":{"name":"2014 International Conference on Computer Communication and Informatics","volume":"68 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129990674","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Secure service to prevent data breaches in cloud","authors":"N. Doe, V. Suganya","doi":"10.1109/ICCCI.2014.6921755","DOIUrl":"https://doi.org/10.1109/ICCCI.2014.6921755","url":null,"abstract":"Cloud Computing is a computing paradigm shift where computing is moved away from personal computers or an individual server to a cloud of computers. Its flexibility, cost-effectiveness, and dynamically re-allocation of resources as per demand make it desirable. At an unprecedented pace, cloud computing has simultaneously transformed business and government, and created new security challenges such as data breaches, data loss, account hijacking and denial of service. Paramount among these security threats is data breaches. The proposed work is to prevent data breaching threat by way of providing user authentication through one-time password system and challenge response, risk assessment to identify and prevent possible risks, encryption using enhanced elliptic curve cryptography where a cryptographically secure random number generation is used to make the number unpredictable, data integrity using MD5 technique, and key management. The platform for deployment of the application is Google App Engine.","PeriodicalId":244242,"journal":{"name":"2014 International Conference on Computer Communication and Informatics","volume":"2205 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130140080","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Excogitation of secure data authentication model for wireless body area network","authors":"S. Sridharan, Himanshu Shrivastava","doi":"10.1109/ICCCI.2014.6921738","DOIUrl":"https://doi.org/10.1109/ICCCI.2014.6921738","url":null,"abstract":"This paper outlines the implementation of a secure data authentication model for the wireless body area network using a single private key exchanged during the time of configuration. The need for secure data exchange grows rapidly due the fact that the data exchanged are confined to the details of the ailing patient. Recent researchers have proposed a secure system for WBAN, but there is a huge demand to incorporate the security parameters into it. A system in place must ensure security with the use of limited amount of resources. This paper tries to address these issues of security considering the fact of limited availability of resources like power, bandwidth, thereby helping to achieve, more secure and time-efficient system in place for the effective online health monitoring scheme using WBAN. Also the security system for WBAN is proposed with low computational complexity for the secure transaction using a key utilized cryptographic encryption algorithm.","PeriodicalId":244242,"journal":{"name":"2014 International Conference on Computer Communication and Informatics","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134255469","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A low power double phase clock multiband flexible divider","authors":"G. Priya, M. Dinesh","doi":"10.1109/ICCCI.2014.6921814","DOIUrl":"https://doi.org/10.1109/ICCCI.2014.6921814","url":null,"abstract":"Clock consumes mostly 60% of the maximum power in an IC since it is the single signal which propagate to all part of the design with maximum toggling rate so it should be taken at most care for designing a multiband low power clock. Affiliated standards are the Wireless LAN (WLAN) in the multigigahertz bands such as HiperLAN II and IEEE 802.11a/b/g, for higher end data link and standards like IEEE 802.15.4 are affiliated for low-rate data communication. The demand for cheaper cost, cheaper power and multiband RF designs increased in connection with need of maximum level of integration. In this Project IEEE 802.15.4 and 802.11 a/b/g WLAN frequency synthesizer is designed based on pulse-swallow topology and it is simulated using Verilog HDL, Modelism and Synthesized using Tanner tool. The complex band divider contain a wideband multimodulus 32/33/47/48 frequecy divider and an developed unit-cell for swallow (S) counter and can separate the frequencies in the three bands of 2.4-2.484 GHz, 5.15-5.35 GHz, and 5.725-5.825 GHz with a resolution selectable from 1 to 25 MHzThis design aims for designing a low power double clock for multiband frequency. The design is modeled using Verilog, simulated using Modelism and synthesized using Tanner.","PeriodicalId":244242,"journal":{"name":"2014 International Conference on Computer Communication and Informatics","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128907393","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}