2015 International Conference on Applied and Theoretical Computing and Communication Technology (iCATccT)最新文献

筛选
英文 中文
Rank based censoring of cognitive radios with cooperative spectrum sensing under hoyt fading channel 霍伊特衰落信道下协同频谱感知认知无线电基于秩的滤波
M. Ranjeeth, S. Anuradha
{"title":"Rank based censoring of cognitive radios with cooperative spectrum sensing under hoyt fading channel","authors":"M. Ranjeeth, S. Anuradha","doi":"10.1109/ICATCCT.2015.7456960","DOIUrl":"https://doi.org/10.1109/ICATCCT.2015.7456960","url":null,"abstract":"Performance of cooperative spectrum sensing with hard decision fusion technique (majority logic) has been evaluated under Hoyt fading environment with the application of censoring scheme. In this paper we have considered Hoyt fading in both reporting channel (R-channel) and sensing channel (S-channel). In a cooperative spectrum sensing (CSS) scheme, the detection primary user (PU) activity is improved by eliminating the heavily faded cognitive radio (CR) users. CRs which are heavily faded those are eliminated by using censoring scheme in the R-channel. Rank based censoring scheme is used to censors the CRs in the presence of Hoyt fading in both perfect and imperfect channels. A hard decision based fusion technique called majority logic rule is considered at the fusion center (FC) to evaluate the performance using missed detection probability (Qm) and total error probability (Qm + Qf). This has been performed in both perfect and imperfect channels by varying the network parameters like: probabilities of false alarm (Qf), R-channel SNR, S-channel SNR and Hoyt fading parameter (q).","PeriodicalId":276158,"journal":{"name":"2015 International Conference on Applied and Theoretical Computing and Communication Technology (iCATccT)","volume":"402 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116661987","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A novel approach for medical image segmentation using PCA and K-means clustering 基于PCA和k均值聚类的医学图像分割新方法
J. Katkar, T. Baraskar, V. Mankar
{"title":"A novel approach for medical image segmentation using PCA and K-means clustering","authors":"J. Katkar, T. Baraskar, V. Mankar","doi":"10.1109/ICATCCT.2015.7456922","DOIUrl":"https://doi.org/10.1109/ICATCCT.2015.7456922","url":null,"abstract":"Physician use medical images to find abnormalities in human bodies and to locate the discontinuities. In transmission process sometimes medical images are corrupted due to external noise. Therefore need to improve the image quality, put down the computational complexity and signal to noise ratio. There is need of segmentation to improve performance analysis and image quality. Segmentation method is use to identify important regions in medical images, it is a unique technique for partitioning image into meaningful sub regions or object with same attribute. Proposed method state Principle component analysis and k-means clustering method for segmentation of medical images and extracts meaningful part from medical image in efficient manner. K-means Clustering is the process of extracting meaningful part from image. Adding Principle Component Analysis for feature extraction and formation of precise number of cluster to increase the accuracy. To develop a system which will perform segmentation of MRI images to locate disorder in better way.","PeriodicalId":276158,"journal":{"name":"2015 International Conference on Applied and Theoretical Computing and Communication Technology (iCATccT)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124818997","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
A content based image retrieval system using shape analysis 基于内容的图像检索系统
P. Nikkam, N. Hegde, B. E. Reddy
{"title":"A content based image retrieval system using shape analysis","authors":"P. Nikkam, N. Hegde, B. E. Reddy","doi":"10.1109/ICATCCT.2015.7456868","DOIUrl":"https://doi.org/10.1109/ICATCCT.2015.7456868","url":null,"abstract":"Image retrieval is a process of retrieving the similar images from a huge dataset. The retrieving of images is done based on the query image and the matched feature with the dataset images. In this paper we have proposed a novel method for efficient retrieval using shape analysis of the query and dataset images. The key points of the work are detection of shape and extraction of the features based on the shape. The extracted features are trained by using the support vector machine classification method. The simulation results show the accuracy of the proposed system as 96.69%.","PeriodicalId":276158,"journal":{"name":"2015 International Conference on Applied and Theoretical Computing and Communication Technology (iCATccT)","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125970234","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An efficient particle swarm optimization and rule mining for fault diagnosis of dissolved gas analysis 基于粒子群优化和规则挖掘的溶解气体分析故障诊断方法
Namrata Dehariya, Vinay Pathak, A. Dubey
{"title":"An efficient particle swarm optimization and rule mining for fault diagnosis of dissolved gas analysis","authors":"Namrata Dehariya, Vinay Pathak, A. Dubey","doi":"10.1109/ICATCCT.2015.7457006","DOIUrl":"https://doi.org/10.1109/ICATCCT.2015.7457006","url":null,"abstract":"Dissolved gas Analysis (DGA) is the most vital segment of discovering shortcoming in huge oilfilled transformers. Early recognition of beginning issues in transformers decreases unreasonable impromptu blackouts. The most important and dependable strategy for assessing the center of transformer is the disintegrated gas investigation. In this paper we have used dissolved gas analysis for the analytical and computation study which is used for the evaluation used as a diagnostic tool for evaluating the condition of the transformer. We have proposed an efficient Particle Swarm Optimization using Rule Mining for Fault Diagnosis of Dissolved Gas Analysis. In this approach we first apply associative IEC for finding the faults. Then Item based individual association are applied on different gas ratio. It is on the basis on the values taken as a data set. It shows the individual associated improvement in the concentration quantity. Then by using random particle swarm optimization it is tuned to their maximum threshold value for obtaining the saturation points. The results show the improvement in fault diagnosis and provide and approach for finding associated saturation point.","PeriodicalId":276158,"journal":{"name":"2015 International Conference on Applied and Theoretical Computing and Communication Technology (iCATccT)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122714024","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Separation of singing voice from music accompaniment using matrix factorization method 用矩阵分解法分离歌唱声音与音乐伴奏
Harshada P. Burute, P. Mane
{"title":"Separation of singing voice from music accompaniment using matrix factorization method","authors":"Harshada P. Burute, P. Mane","doi":"10.1109/ICATCCT.2015.7456876","DOIUrl":"https://doi.org/10.1109/ICATCCT.2015.7456876","url":null,"abstract":"Songs play an important role in entertainment. An audio signal separation system should be able to identify different audio signals such as speech, music and background noise. In a song the singing voice provides useful information. An automatic singing voice separation system is used for attenuating or removing the music accompaniment. The singing voice becomes a main attractive focus of attention. Singing is used to produces relevant sound with music by the human voice. The paper present the developed algorithm Robust Principal Component Analysis (RPCA) for separating singing voice from music background. This method is a matrix factorization for solving low-rank and sparse matrices. Singing Voice has been effectively separated from the mixture of music accompaniment. Evaluation results of the algorithm shows that this method can achieve around 5.2 dB higher GNSDR (Global Normalized Source to Distortion Ratio) on the MIR-1K dataset. Moreover, we examine the separation results for different values of k.","PeriodicalId":276158,"journal":{"name":"2015 International Conference on Applied and Theoretical Computing and Communication Technology (iCATccT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129746853","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A survey for restricting the DDOS traffic flooding and worm attacks in Internet 限制互联网DDOS流量泛滥和蠕虫攻击的调查研究
R. Saranya, S. Kannan, N. Prathap
{"title":"A survey for restricting the DDOS traffic flooding and worm attacks in Internet","authors":"R. Saranya, S. Kannan, N. Prathap","doi":"10.1109/ICATCCT.2015.7456891","DOIUrl":"https://doi.org/10.1109/ICATCCT.2015.7456891","url":null,"abstract":"DoS attacks are significant issues for the Internet. With huge need on internet service provided using large application server, Denial of Service (DoS) attack is developed into a key security issue in the network service provisioning. Flooding attack is one of the major DoS attacks, floods the network traffic abnormally to disturb the internet services which is rendered to users. In addition, worm attack is an impeding feature on internet peer servers on providing services to the users. Worm attack self replicates and distribute the malware across the network by its own. However, the worm detection schemes are not able to scan and detect exponentially rising abnormal traffic patterns. It is more susceptible in providing the security to the internet peer servers. DoS flooding and worm attack resistance schemes are not easy to implement because it needs large number of cooperating and monitoring activities on the services provided to the users. So, Integrated Quantum Flow and Hidden Markov Chain Approach (IQF-HMC) is designed to restrict the DDOS traffic flooding and worm attacks in internet.","PeriodicalId":276158,"journal":{"name":"2015 International Conference on Applied and Theoretical Computing and Communication Technology (iCATccT)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121496594","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
EPMOS based secure mobile communication in LTE/SAE networks LTE/SAE网络中基于EPMOS的安全移动通信
K. Prakash, Balachandra Muniyal
{"title":"EPMOS based secure mobile communication in LTE/SAE networks","authors":"K. Prakash, Balachandra Muniyal","doi":"10.1109/ICATCCT.2015.7456863","DOIUrl":"https://doi.org/10.1109/ICATCCT.2015.7456863","url":null,"abstract":"PKI (Public Key Infrastructure) based AKA (Authentication and Key Agreement) scheme known as Optimizing PKI for 3GPP Authentication and Key Agreement(OPAKA) has been proposed in the field of 3G wireless mobile communication system. The study of OPAKA revealed the drawback of protocol and an Enhanced version of OPAKA namely EPMOS (Enhancing PKI for Mobile Commerce Security) is proposed. The recent expansion of wireless technologies and novel applications and the advancement in mobile technology after UMTS-3G has been taken up to the next level by the 3GPP Long Tem Evolution/System Architecture Evolution (LTE/SAE). The realisation of better bandwidth, full interworking with other access/backend systems using all-IP architecture with well-defined interworking with circuit switched system becoming reality. The GSM has focussed the security for radio path whereas UMTS has enhanced it in to network functionalities. The future networks based on IP mechanism demands more security features, since the threats related to IP are also possible. The EPMOS can used to solve the vulnerabilities in LTE.","PeriodicalId":276158,"journal":{"name":"2015 International Conference on Applied and Theoretical Computing and Communication Technology (iCATccT)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130867933","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Photonic crystal fiber with anomalous dispersion behavior and high birefringence 具有异常色散和高双折射特性的光子晶体光纤
Pranaw Kumar, Priyanka Das
{"title":"Photonic crystal fiber with anomalous dispersion behavior and high birefringence","authors":"Pranaw Kumar, Priyanka Das","doi":"10.1109/ICATCCT.2015.7456927","DOIUrl":"https://doi.org/10.1109/ICATCCT.2015.7456927","url":null,"abstract":"A novel design of hexagonal PCF has been investigated with variation in areas of circular air holes. The structure consists of six rings. The three outermost ring has largest circular air holes. The immediate two rings next to the innermost ring consists of smallest circular air holes. The innermost ring consists of circular air holes whose area is lesser than the three outermost rings but larger than the second and third ring. The designed fiber reports a very low dispersion. Moreover a high birefringence is observed at the first optical window. Besides, normalized frequencies and confinement loss is also studied. This fiber can be used for generation of broadband supercontinnum and soliton based devices.","PeriodicalId":276158,"journal":{"name":"2015 International Conference on Applied and Theoretical Computing and Communication Technology (iCATccT)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134456648","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
A wireless based patient monitoring system using Android technology 基于Android技术的无线病人监护系统
B. Sneha, V. Bhavana, S. Brunda, T. Murali, S. Puneeth, B. A. Ravikiran
{"title":"A wireless based patient monitoring system using Android technology","authors":"B. Sneha, V. Bhavana, S. Brunda, T. Murali, S. Puneeth, B. A. Ravikiran","doi":"10.1109/ICATCCT.2015.7456851","DOIUrl":"https://doi.org/10.1109/ICATCCT.2015.7456851","url":null,"abstract":"Treating patients in remote areas in emergency condition are critical task and hence a continuous monitor system is essential for doctors to treat them when they are in need. This system can be used for more than one patient at a time. A patient monitoring system can be developed with the advantages of network technology and multiple sensor fusion technology along with the combination of Smartphone and Bluetooth technologies. Development of smart phones has leaded the world in technology usage from common people to professional to their needs. Sensor technology and Android Smartphone can be used as a key component of this system to solve the purpose of mobile medical care. Data collected by the sensors is processed by the microcontroller device and sent to Android mobile phone through Bluetooth and it can also transmit this data on time to the remote server. This method helps doctor to get data of patient and treat them well. Along with this, it also provides connection to the medical center using cell phones to transfer all the acquired data through internet.","PeriodicalId":276158,"journal":{"name":"2015 International Conference on Applied and Theoretical Computing and Communication Technology (iCATccT)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116275246","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
An efficient lossless compression using double Huffman minimum variance encoding technique 采用双霍夫曼最小方差编码技术实现高效无损压缩
G. Sandeep, B. S. Sunil kumar, D. Deepak
{"title":"An efficient lossless compression using double Huffman minimum variance encoding technique","authors":"G. Sandeep, B. S. Sunil kumar, D. Deepak","doi":"10.1109/ICATCCT.2015.7456942","DOIUrl":"https://doi.org/10.1109/ICATCCT.2015.7456942","url":null,"abstract":"A Huffman code is a particular type of optimal prefix code that is commonly used for loss-less data compression. The process of finding such a code is known as Huffman coding. The output from Huffman's algorithm can be viewed as a variable-length code table for encoding a source symbol. The algorithm derives this table from the estimated probability or frequency of occurrence for each possible value of the source symbol. In this paper, we present a new approach to measure the performance and redundancy that work on two methods of coding like Huffman coding and Minimum Variance Huffman Coding. After getting the code-word for each symbol, we compress it on the basis of its binary values like 0 and 1 using binary coding. This is applied to both the approaches; this process is called as Double Huffman Coding. Finally we produce a better result than Huffman coding.","PeriodicalId":276158,"journal":{"name":"2015 International Conference on Applied and Theoretical Computing and Communication Technology (iCATccT)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123975614","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信