2014 International Conference on Computer Communication and Informatics最新文献

筛选
英文 中文
Characterization of Analog to Digital converter using Histogram method with noise as stimuli 以噪声为刺激的模数转换器直方图表征方法
2014 International Conference on Computer Communication and Informatics Pub Date : 2014-10-16 DOI: 10.1109/ICCCI.2014.6921785
Bhawana Garg, D. K. Mishra
{"title":"Characterization of Analog to Digital converter using Histogram method with noise as stimuli","authors":"Bhawana Garg, D. K. Mishra","doi":"10.1109/ICCCI.2014.6921785","DOIUrl":"https://doi.org/10.1109/ICCCI.2014.6921785","url":null,"abstract":"ADC is a critical device of any electronic, measurement and communication system, which need to be characterized and tested precisely. This paper describes the testing of ADC with histogram method using white Gaussian noise as stimuli. The use of this signal avoids considering all other noise present in the system. Gain, offset, linearity errors and effective no. of Bits have estimated using this method. Large no. of samples have collected and applied to device under test, and then from histogram, code transition level of each code has computed. Using least square minimization technique Best fit line is determined. Gain and offset can be calculated from best fit line. ENOB is determined from the ratio of actual to ideal rms error and is compared with the previous data available in literature. Known values of nonlinearity are inserted into ideal ADC to convert it into real life ADC. Arbitrary inserted values of nonlinearities are compared with the calculated values. This paper covers the simulation of 5-bit ADC and experimental results are presented.","PeriodicalId":244242,"journal":{"name":"2014 International Conference on Computer Communication and Informatics","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131343868","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Square ring dielectric resonator antenna for wideband applications 用于宽带应用的方环介质谐振器天线
2014 International Conference on Computer Communication and Informatics Pub Date : 2014-10-16 DOI: 10.1109/ICCCI.2014.6921781
Ayaskanta Panigrahi, Y. Choukiker, S. Behera, R. Jyoti
{"title":"Square ring dielectric resonator antenna for wideband applications","authors":"Ayaskanta Panigrahi, Y. Choukiker, S. Behera, R. Jyoti","doi":"10.1109/ICCCI.2014.6921781","DOIUrl":"https://doi.org/10.1109/ICCCI.2014.6921781","url":null,"abstract":"In this paper, a square ring dielectric resonator (SRDR) antenna is presented which is excited by an U-shaped microstrip feed. The Q-factor can be lowered and bandwidth can be improved by removing the central portion of the dielectric resonator. The proposed feed for ring dielectric resonator antenna has been achieved -10 dB impedance bandwidth of 46.7% for 3.9 to 6.20 GHz. The proposed antenna gives the appreciable gain and better radiation pattern at the resonant frequencies.","PeriodicalId":244242,"journal":{"name":"2014 International Conference on Computer Communication and Informatics","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116566077","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Virtualization approach to reduce network latency for thin client performance optimization in cloud computing environment 采用虚拟化方法减少网络延迟,优化云计算环境下的瘦客户机性能
2014 International Conference on Computer Communication and Informatics Pub Date : 2014-10-16 DOI: 10.1109/ICCCI.2014.6921753
Sumita U. Sharma, Yogendra Babarao Gandole
{"title":"Virtualization approach to reduce network latency for thin client performance optimization in cloud computing environment","authors":"Sumita U. Sharma, Yogendra Babarao Gandole","doi":"10.1109/ICCCI.2014.6921753","DOIUrl":"https://doi.org/10.1109/ICCCI.2014.6921753","url":null,"abstract":"Thin Clients with Virtual Desktops prove to be the best equipments to access the online services provided by the cloud over the internet. Some of the proven benefits of thin clients are lower cost of ownership and very less power consumption which supports to Green Computing. The ability of thin client can be increased by reducing network latency to improve the performance and usability of thin clients. Network latency causes a great delay in transmitting a message or communication from one location to another. Many other external factors, like congestion in the network, bandwidth limitation, computer storage capacities and the distance between two locations also contribute to the delay. The proposed paper aims at the issues of Network Latency and its various aspects in a thin client network. The paper also undergoes with experimenting thin client with different environment to find network latency which helped in finding conclusion and proposing new ideology for reducing network latency. The experiments are performed on simulated banking application and running it over thin client with different services. This inshore about the need of reducing network latency for real time thin client and cloud computing environment to increase its performance and provides a better user experiences. The paper also proposes new methods to overcome such problems.","PeriodicalId":244242,"journal":{"name":"2014 International Conference on Computer Communication and Informatics","volume":"210 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132760548","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Feature selection algorithms for automatic speech recognition 自动语音识别的特征选择算法
2014 International Conference on Computer Communication and Informatics Pub Date : 2014-10-16 DOI: 10.1109/ICCCI.2014.6921797
M. Kalamani, S. Valarmathy, Head, C. Poonkuzhali, P. Scholar, Catherine J N Pg Scholar
{"title":"Feature selection algorithms for automatic speech recognition","authors":"M. Kalamani, S. Valarmathy, Head, C. Poonkuzhali, P. Scholar, Catherine J N Pg Scholar","doi":"10.1109/ICCCI.2014.6921797","DOIUrl":"https://doi.org/10.1109/ICCCI.2014.6921797","url":null,"abstract":"Speech is one of the most promising models through which various human emotions such as happiness, anger, sadness, and normal state can be determined, apart from facial expressions. Researchers have proved that acoustic parameters of a speech signal such as energy, pitch, Mel frequency Cepstral Coefficient (MFCC) are vital in determining the emotion state of a person. There is an increasing need for a new Feature selection method, to increase the processing rate and recognition accuracy of the classifier, by selecting the discriminative features. This study investigates the various feature selection algorithms, used for selecting the optimal features from speech vectors which are extracted using MFCC. The feature selected is then used in the modeling stage.","PeriodicalId":244242,"journal":{"name":"2014 International Conference on Computer Communication and Informatics","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133217707","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Normalized Worm-hole Local Intrusion Detection Algorithm(NWLIDA) 规范化虫洞局部入侵检测算法(NWLIDA)
2014 International Conference on Computer Communication and Informatics Pub Date : 2014-10-16 DOI: 10.1109/ICCCI.2014.6921748
Aarfa Khan, S. Shrivastava, Vineet Richariya
{"title":"Normalized Worm-hole Local Intrusion Detection Algorithm(NWLIDA)","authors":"Aarfa Khan, S. Shrivastava, Vineet Richariya","doi":"10.1109/ICCCI.2014.6921748","DOIUrl":"https://doi.org/10.1109/ICCCI.2014.6921748","url":null,"abstract":"A Mobile Ad-Hoc Network (MANET) is a arrangement of wireless mobile nodes which forms a temporary network for the communication without the access point, high availability of wireless devices in everyday is a measure factor in the success of infrastructure-less networks. MANET is dealing with both kinds of attacks, active and passive attacks at all the layers of network model. The lack in security measures of their routing protocols is alluring a number of attackers to intrude the network. A particular type of attack; known as Wormhole, which is launched by creation of tunnels and it results in complete disruption of routing paths on MANET. This paper presents a technique NWLID: Normalized Wormhole Local Intrusion detection Algorithm which is the modified version of Local Intrusion Detection Routing Security over mobile adhoc Network which has an intermediate neighbor node discovery mechanism, packet drop calculator, individual node receiving packet estimator followed by isolation technique for the confirmed Wormhole nodes. Result shows the effect of wormhole attack on normal behavior and improvement of performance after the application of proposed scheme. The effectiveness of NWLID algorithm is evaluated using ns2 network simulator.","PeriodicalId":244242,"journal":{"name":"2014 International Conference on Computer Communication and Informatics","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129499766","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Automotive in vehicle network protocols 汽车网络协议中的汽车
2014 International Conference on Computer Communication and Informatics Pub Date : 2014-10-16 DOI: 10.1109/ICCCI.2014.6921836
B. Vinodh Kumar, J. Ramesh
{"title":"Automotive in vehicle network protocols","authors":"B. Vinodh Kumar, J. Ramesh","doi":"10.1109/ICCCI.2014.6921836","DOIUrl":"https://doi.org/10.1109/ICCCI.2014.6921836","url":null,"abstract":"Need for sophisticated automotive electronics is increasing as per the customers demand for luxury, comfort and safety grows. In addition to this computational power of the microcontrollers, FPGAs and processors have also reached new heights forcing vehicle OEMs (Original Equipment Manufacturers) to modify their conventional vehicle networking architecture to handle large amount of data's. This paper reviews traditional and latest vehicle network protocols and compares their performance, speed and its area of application.","PeriodicalId":244242,"journal":{"name":"2014 International Conference on Computer Communication and Informatics","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128944065","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Power transformer protection using wavelet packet transform 基于小波包变换的电力变压器保护
2014 International Conference on Computer Communication and Informatics Pub Date : 2014-10-16 DOI: 10.1109/ICCCI.2014.6921841
K. Ramesh, M. Sushama
{"title":"Power transformer protection using wavelet packet transform","authors":"K. Ramesh, M. Sushama","doi":"10.1109/ICCCI.2014.6921841","DOIUrl":"https://doi.org/10.1109/ICCCI.2014.6921841","url":null,"abstract":"This paper presents a novel technique for power transformer protection. This technique is based on extracting current signals under different operating conditions such as during energization of transformer and different fault conditions. Fast wavelet transform (FWT) schemes may not be so effective for data that has mainly oscillating features. An effective solution to distinguish inrush current from internal fault cases involves examining the signals in both the time and frequency domains simultaneously. The wavelet packet transform is the extension of the FWT which allows fine characterization of signal content for both time and frequency together. In the proposed work A 138/13.8 kV transformer was simulated using Matlab simulink environment. The transient signals of differential currents are captured and analyzed using `db1' wavelet packet transform at level 2. The energy content of the second level approximation at different fault incidence angles is calculated. A threshold is set based upon number of simulation studies. By considering the threshold value as the reference, the magnetizing inrush current is distinguished from internal fault current. The results indicate that the proposed scheme of protection is stable, reliable, and fast during the discrimination between magnetizing inrush currents, and internal faults.","PeriodicalId":244242,"journal":{"name":"2014 International Conference on Computer Communication and Informatics","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127894931","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
A novel design microgripper based on electrothermal expansion principle 一种基于电热膨胀原理的新型微夹持器设计
2014 International Conference on Computer Communication and Informatics Pub Date : 2014-10-16 DOI: 10.1109/ICCCI.2014.6921816
S. A. Sheikh, T. Shanmuganantham
{"title":"A novel design microgripper based on electrothermal expansion principle","authors":"S. A. Sheikh, T. Shanmuganantham","doi":"10.1109/ICCCI.2014.6921816","DOIUrl":"https://doi.org/10.1109/ICCCI.2014.6921816","url":null,"abstract":"In this paper, a newly modeled 3-D MEMS electrothermally actuated microgripper has been designed and simulated using COMSOL 4.3b based on finite element method (FEM). Electrothermal mechanism is the most widely used mechanism for providing large displacements at very small voltages. The new model is designed by combining asymmetric arm structure and a thin gold layer is inserted in the asymmetric arms which make it a typical bimorph structure. The microgripper presented here is electro-thermally actuated and optimized geometrically and materially to explore the effect of dimensional variation and material change on its performance. The in-plane, out of plane displacements, strain, stress, current density and temperature has been analyzed and the results are discussed.","PeriodicalId":244242,"journal":{"name":"2014 International Conference on Computer Communication and Informatics","volume":"98 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122628991","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
An analysis of LSB based image steganography techniques 基于LSB的图像隐写技术分析
2014 International Conference on Computer Communication and Informatics Pub Date : 2014-10-16 DOI: 10.1109/ICCCI.2014.6921751
K. Thangadurai, G. Sudha Devi
{"title":"An analysis of LSB based image steganography techniques","authors":"K. Thangadurai, G. Sudha Devi","doi":"10.1109/ICCCI.2014.6921751","DOIUrl":"https://doi.org/10.1109/ICCCI.2014.6921751","url":null,"abstract":"Steganography refers to information or a file that has been concealed inside a digital picture, video or audio file. If a person views the object in which the information is hidden inside, he or she will have no indication that there is any hidden information. So the person will not try to decrypt the information. Steganography can be divided into Text Steganography, Image Steganography, Audio/Video Steganography. Image Steganography is one of the common methods used for hiding the information in the cover image. LSB is very efficient algorithm used to embed the information in a cover file. This paper presents the detail knowledge about the LSB based image steganography and its applications to various file formats. In this paper we also analyze the available image based steganography along with cryptography technique to achieve security.","PeriodicalId":244242,"journal":{"name":"2014 International Conference on Computer Communication and Informatics","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122469481","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 34
Secured data destruction in cloud based multi-tenant database architecture 基于云的多租户数据库架构中的安全数据销毁
2014 International Conference on Computer Communication and Informatics Pub Date : 2014-10-16 DOI: 10.1109/ICCCI.2014.6921774
M. Vanitha, C. Kavitha
{"title":"Secured data destruction in cloud based multi-tenant database architecture","authors":"M. Vanitha, C. Kavitha","doi":"10.1109/ICCCI.2014.6921774","DOIUrl":"https://doi.org/10.1109/ICCCI.2014.6921774","url":null,"abstract":"Cloud computing falls into two general categories. Applications being delivered as service and hardware and data centers that provides those services [1]. Cloud storage evolves from just a storage model to a new service model where data is being managed, maintained, and stored in multiple remote severs for back-up reasons. Cloud platform server clusters are running in network environment and it may contain multiple users' data and the data may be scattered in different virtual data centers. In a multi-user shared cloud computing platform users are only logically isolated, but data of different users may be stored in same physical equipment. These equipments can be rapidly provisioned, implemented, scaled up or down and decommissioned. Current cloud providers do not provide the control or at least the knowledge over the provided resources to their customers. The data in cloud is encrypted during rest, transit and back-up in multi tenant storage. The encryption keys are managed per customer. There are different stages of data life cycle Create, Store, Use, Share, Archive and Destruct. The final stage is overlooked [2], which is the complex stage of data in cloud. Data retention assurance may be easier for the cloud provider to demonstrate while the data destruction is extremely difficult. When the SLA between the customer and the cloud provider ends, today in no way it is assured that the particular customers' data is completely destroyed or destructed from the cloud provider's storage. The proposed method identifies way to track individual customers' data and their encryption keys and provides solution to completely delete the data from the cloud provider's multi-tenant storage architecture. It also ensures deletion of data copies as there are always possibilities of more than one copy of data being maintained for back-up purposes. The data destruction proof shall also be provided to customer making sure that the owner's data is completely removed.","PeriodicalId":244242,"journal":{"name":"2014 International Conference on Computer Communication and Informatics","volume":"298 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123191051","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信