{"title":"Performance Evaluation of Modulation Techniques with Iterative IDMA Receivers Using Optimum Tree Based Interleaver","authors":"K. Gupta, C. Shukla, S. Tiwari, M. Shukla","doi":"10.1109/CSNT.2011.109","DOIUrl":"https://doi.org/10.1109/CSNT.2011.109","url":null,"abstract":"The Interleave-Division Multiple-Access (IDMA) scheme is known for property of orthogonality amongst its user-specific interleavers. The interleavers are, therefore, referred has the heart of IDMA Transceivers. In the literature, researchers have proposed Tree Based Interleaver (TBI) which not only reduces the bandwidth requirement in comparison to that required in case of Random Interleavers (RI) but also reduces computational complexity drastically when compared with that of power interleavers. The memory requirement at receiver end and its cost problem are also solved by tree based interleaver with further reduction of the amount of information exchange between mobile stations and base stations required to specify the user-specific interleavers. In this paper, the performance analysis of iterative IDMA receivers have been evaluated with BPSK & QPSK modulation techniques employing tree based interleavers and random interleavers in uncoded and rate 1/2 covolutionally coded conditions with Additive White Gaussian Noise (AWGN) channel. During the simulation, it has been observed that IDMA system with QPSK modulation techniques employing TBI outperforms its counterparts optimally.","PeriodicalId":294850,"journal":{"name":"2011 International Conference on Communication Systems and Network Technologies","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-06-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115101849","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A. Panda, R. Suryanarayana, Abhishek Sahoo, Jayanta Nayak, R. K. Mishra
{"title":"A Printed Monopole Antenna with Symmetric Meandered Arms for WLAN, WiMAX Applications","authors":"A. Panda, R. Suryanarayana, Abhishek Sahoo, Jayanta Nayak, R. K. Mishra","doi":"10.1109/CSNT.2011.55","DOIUrl":"https://doi.org/10.1109/CSNT.2011.55","url":null,"abstract":"In this paper, a planar dual band symmetric Meandered Arms monopole antenna for wireless local area network (WLAN) & WiMAX applications is presented. The antenna consists of two symmetric Meandered arms radiating strip leading to generate two separate resonant modes where the first mode is for the 3.5 GHz band and the second mode is for the 5.2/5.8 GHz band operation. The purposed antenna has a measured impedance bandwidths of 3.39-3.5 GHz and 5.5-5.6 GHz, and owns good radiation characteristics impedance bandwidths, with a compact size of 30x35xl.6 mm3.The radiation pattern and resonant frequency are mainly affected by symmetric meandered arms radiating patch and a rectangular ground plane. The CST Microwave studio is employed for designing the antenna. This purposed antenna is fed by a coaxial probe through a SMA connector.","PeriodicalId":294850,"journal":{"name":"2011 International Conference on Communication Systems and Network Technologies","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-06-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128155351","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Voronoi-based Continuous Query Processing for Mobile Users","authors":"R. Srikanth, L. Awasthi","doi":"10.1109/CSNT.2011.36","DOIUrl":"https://doi.org/10.1109/CSNT.2011.36","url":null,"abstract":"The emerging location-detection devices together with ubiquitous connectivity have enabled a large variety of location-based services (LBS). Location-based services are becoming popular for mobile users. The mobile users' location plays a key role to provide the service from one side, but it other side it is dimension of their privacy, so it necessary to keep the user information anonymous to the other parties. Since one important issue in LBS is to achieve an accurate service, hence it is important to use the mobile user accurate location. Using the location accurately raises some concerns on behalf of the user's privacy. One solution for meeting this requirement is using by the means of a anonymizer. Anonymizer uses K-anonymity cloaking the user location to K-anonymizing spatial region (K-ASR). Traditional K-anonymity method needs complex query processing algorithms at the server side and have drawback of tracking user. In this paper we have proposed a new model for mobile users to retrieve the result quickly and increases user's privacy.","PeriodicalId":294850,"journal":{"name":"2011 International Conference on Communication Systems and Network Technologies","volume":"369 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-06-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126707031","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Improved Ranking Scheme for Selection of Parents in Multi-Objective Genetic Algorithm","authors":"Rahila Patel, M. Raghuwanshi, L. Malik","doi":"10.1109/CSNT.2011.156","DOIUrl":"https://doi.org/10.1109/CSNT.2011.156","url":null,"abstract":"Among the three genetic operator selection, crossover and mutation, selection operator is very important. Selection operator has got the force that may pull the search to a narrow area of search space or it may lend the algorithm to search the entire search space. This work focuses attention on the selection stage of multi-objective Genetic algorithm (MOGA) used for solving multi-objective optimization problems. Here we propose an improved selection scheme along with summation of normalized objective value based sorting. The algorithm is tested on test problems of CEC09 competition. The proposed algorithm SNOVMOGA (Summation of Normalized Objective Value based Multi-objective Genetic Algorithm) has shown either comparable or good performance on few unconstrained test problems. The goal of performance improvement of the real-coded multi-objective genetic algorithm has been achieved to some extent in this work.","PeriodicalId":294850,"journal":{"name":"2011 International Conference on Communication Systems and Network Technologies","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-06-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126726515","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Software Reconfigurable State-of-the-Art Communication Suite for Fighter Aircraft","authors":"M. Jayachandran, J. Manikandan","doi":"10.1109/CSNT.2011.155","DOIUrl":"https://doi.org/10.1109/CSNT.2011.155","url":null,"abstract":"Communication systems are considered as one of the major requirements for the current and next generation fighter aircrafts to complete a mission successfully. Efficient net-centric warfare and situational awareness can be achieved with modernized communication system and high-end sensors. The conventional communication systems available consist of individual systems for each functionality. In such cases, the failure of one system leads to failure of the functionality of that system and the mission has to be completed without that system. Hence there is an urge to develop a state-of-the-art on-flight software reconfigurable communication system to provide better redundancy, successful completion of mission and efficient utilization of systems on-board for fighter aircraft. In this paper, the functionality of all the on-board communication systems is explained and the design of a state-of-the-art software re-configurable communication suite is proposed for fighter aircrafts. The highlight of this architecture is that the hardware resources are shared between the systems and incase of failure of one system, the other system shall be reconfigured on-flight to take up the functionality of the failed system. The software architecture employs software code reusability for easy debugging and code verification. The proposed system is based on the concept of Software Defined Radio (SDR) and the functionality is extended from hand-held radio to entire communication system of the aircraft.","PeriodicalId":294850,"journal":{"name":"2011 International Conference on Communication Systems and Network Technologies","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-06-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131265453","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Punit Mundra, Shobhit Shukla, Madhavi Sharma, R. Pai, Sanjay Singh
{"title":"Modeling and Verification of Kerberos Protocol Using Symbolic Model Verifier","authors":"Punit Mundra, Shobhit Shukla, Madhavi Sharma, R. Pai, Sanjay Singh","doi":"10.1109/CSNT.2011.140","DOIUrl":"https://doi.org/10.1109/CSNT.2011.140","url":null,"abstract":"Authentication is one of the biggest issues concerning information security in the context of distributed environments. Various protocols are used for the authentication purpose such as Needham-Schroeder, Kerberos protocol etc. The aim of this paper is to verify and formalize the Kerberos protocol using NuSMV model checker. The protocol version used in this paper is Kerberos version 4. The paper suggests CTL specifications for authentication, secrecy and integrity. We have also proposed an approach to identify presence of intruder in the system.","PeriodicalId":294850,"journal":{"name":"2011 International Conference on Communication Systems and Network Technologies","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-06-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130615808","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Huawei Zhai, Weishi Zhang, Licheng Cui, Hongbo Liu, A. Abraham
{"title":"A Bigraph Model for Multi-route Choice in Urban Rail Transit","authors":"Huawei Zhai, Weishi Zhang, Licheng Cui, Hongbo Liu, A. Abraham","doi":"10.1109/CSNT.2011.166","DOIUrl":"https://doi.org/10.1109/CSNT.2011.166","url":null,"abstract":"The conventional methods to solve the multi-route choice problems in transportation domain usually focus on the feelings and behaviors of human beings, which lead the conclusion of conjectured not to be reasonable, such as fare clearing or passenger flow data forecast and distribution. In the modern urban rail transit network, modern operation pattern with the technology of internet of things in the ubiquitous computing environment supplies sufficient travel information of the passenger, with which we proposed a novel method to model multi-route choice problem by using bigraphical theories and offered an algorithm framework, which can be used to analyze the model in a quantitative way.","PeriodicalId":294850,"journal":{"name":"2011 International Conference on Communication Systems and Network Technologies","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-06-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133027725","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
R. Chauhan, Ratenesh Kumar, M. Shukla, Ashutosh Kumar Sigh, G. Bagaria
{"title":"Proposal for One Dimensional Optical Orthogonal Codes: Design, Analysis, & Algorithm","authors":"R. Chauhan, Ratenesh Kumar, M. Shukla, Ashutosh Kumar Sigh, G. Bagaria","doi":"10.1109/CSNT.2011.110","DOIUrl":"https://doi.org/10.1109/CSNT.2011.110","url":null,"abstract":"In this paper, an algorithm is proposed to design maximum possible sets of one dimensional orthogonal codes of given code length 'n', code weight 'w', auto-correlation constraint a λ_a and cross-correlation constraint c λ_c. Each set consists of number of unipolar orthogonal codes up to maximum limit given by Johnson bounds. Here, each of the designed sets of unipolar orthogonal codes is independent of other sets of unipolar orthogonal codes of same length, same weight, and with same or different number of codes. The results of the proposed algorithm are being compared with other one dimensional optical orthogonal code generation schemes presented in literatures. The unipolar orthogonal codes of any of the designed sets can be utilized for generation of optical signature sequences for assignment to users of Incoherent Optical Code Division Multiple Access (OCDMA) system for the purpose of spread spectrum communication over optical fiber.","PeriodicalId":294850,"journal":{"name":"2011 International Conference on Communication Systems and Network Technologies","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-06-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130763548","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Rakhi Dubolia, Roop Singh, S. Bhadoria, Rekha Gupta
{"title":"Digital Image Watermarking by Using Discrete Wavelet Transform and Discrete Cosine Transform and Comparison Based on PSNR","authors":"Rakhi Dubolia, Roop Singh, S. Bhadoria, Rekha Gupta","doi":"10.1109/CSNT.2011.127","DOIUrl":"https://doi.org/10.1109/CSNT.2011.127","url":null,"abstract":"Digital watermarking is a technique which allows an individual to add hidden copyright notices or other verification messages to digital audio, video, or image signals and documents. Watermarking can be done by using least significant bit (LSB), singular value decomposition (SVD), Discrete Fourier Transform (DFT), Discrete cosine transform (DCT) and Discrete wavelet transform (DWT) techniques. In this paper Discrete cosine transform (DCT) and Discrete wavelet transform (DWT) are used for embedding and extraction of watermark. DWT and DCT are compared with respect to peak signal to noise ratio (PSNR) at a different threshold values. DWT gives better Image quality then DCT.","PeriodicalId":294850,"journal":{"name":"2011 International Conference on Communication Systems and Network Technologies","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-06-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131247036","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"MLF: A Technology beyond ALF for Network Security","authors":"Rajesh Sodhani, A. Goyal, Basant Singh Rathore","doi":"10.1109/CSNT.2011.19","DOIUrl":"https://doi.org/10.1109/CSNT.2011.19","url":null,"abstract":"Network and web security measures are now having utmost attention and so the use of firewall, which is vigilant to scrutinize incoming-outgoing packets between private network and Internet. The decision is usually relied upon the source/destination address or port number. Even high end technologies and higher layer protocols like DNS, SMTP, POP3 etc. are also vulnerable and susceptible to be exploited. This urges to redefine the role and scope of firewalls. This paper defines the functions of existing firewalls and various filtration techniques along with their limitations and shortcomings. Further the new schema of MLF (Multi-Layer Filtering) for enhanced network security and to obstruct obnoxious sites is proposed. The security from intruders and attackers is not only based on their IP addresses or their content but through an adoptable method for which a new architecture is proposed.","PeriodicalId":294850,"journal":{"name":"2011 International Conference on Communication Systems and Network Technologies","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-06-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134078289","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}