2011 International Conference on Communication Systems and Network Technologies最新文献

筛选
英文 中文
A Novel Approach to Predict Cancer by Ensembling of Kernel Based Dimension Reduction and Classifier Using DNA Microarrays 基于核降维和DNA微阵列分类器集成的癌症预测新方法
B. K. Mishra, P. Saurabh, B. Verma
{"title":"A Novel Approach to Predict Cancer by Ensembling of Kernel Based Dimension Reduction and Classifier Using DNA Microarrays","authors":"B. K. Mishra, P. Saurabh, B. Verma","doi":"10.1109/CSNT.2011.139","DOIUrl":"https://doi.org/10.1109/CSNT.2011.139","url":null,"abstract":"DNA Micro arrays allow the parallel monitoring of thousands of expression levels of genes simultaneously. The secret behind of this technology is the fact that DNA nucleotide bases will hybridize to certain other nucleotide bases. With the help of DNA Micro arrays we can predict Human cancer considering the genes expression levels across a collection of sample. In this paper we introduce ensemble approach to classification method which included Dimension Reduction. For Dimension Reduction we use Supervised Locally Linear Embedding and for Classification uses Support Vector Machine.","PeriodicalId":294850,"journal":{"name":"2011 International Conference on Communication Systems and Network Technologies","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-06-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133491475","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Application of Antenna Diversity in HIDMA Scheme Using Gold Codes 天线分集在黄金码HIDMA方案中的应用
R. Bansal, Sonia S Anand, Dheeraj Purwar, Aasheesh Shukla
{"title":"Application of Antenna Diversity in HIDMA Scheme Using Gold Codes","authors":"R. Bansal, Sonia S Anand, Dheeraj Purwar, Aasheesh Shukla","doi":"10.1109/CSNT.2011.56","DOIUrl":"https://doi.org/10.1109/CSNT.2011.56","url":null,"abstract":"In Interleave Division Multiple Access (IDMA) scheme, interleavers play a vital role. In recent years IDMA have been proved to give the good performance in terms of data security and noise immunity, but huge memory requirement and complexity are major issues for specifying the interleaver pattern in this scheme. This paper presents the helically interleaved IDMA (HIDMA) system. HIDMA system not only achieves the performance as well as RI-IDMA (randomly interleaved) but also renders the system with low complexity and significant reduction in memory requirement. The performance can be improved significantly by the inclusion of Gold Codes in the system. Further, to take the system into practical considerations the performance of the system is examined in a fading environment. Maximal Ratio Combining (MRC) approach has been utilized using antenna diversity (transmit diversity) to combat the fading error. Evaluation is done on the basis of mathematical analysis and simulations in Rayleigh Fading Environment.","PeriodicalId":294850,"journal":{"name":"2011 International Conference on Communication Systems and Network Technologies","volume":"2009 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-06-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129445612","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Design and Implementation of High Performance AHB Reconfigurable Arbiter for Onchip Bus Architecture 基于片上总线结构的高性能AHB可重构仲裁器的设计与实现
Ashutosh Kumar Singh, A. Shrivastava, G. Tomar
{"title":"Design and Implementation of High Performance AHB Reconfigurable Arbiter for Onchip Bus Architecture","authors":"Ashutosh Kumar Singh, A. Shrivastava, G. Tomar","doi":"10.1109/CSNT.2011.99","DOIUrl":"https://doi.org/10.1109/CSNT.2011.99","url":null,"abstract":"Resolution is a big issue in SOC (system On Chip) while dealing with number of master trying to sense a single data bus. The effectiveness of a system to resolve this priority resides in its ability to logical assignment of the chance to transmit data width of the data, response to the interrupts etc. The purpose of this paper is to propose the scheme to implement reconfigurable architecture so that it can be interface with any common IP core of such a system using the specification of AMBA bus protocol. The scheme involves the typical AMBA features of 'single clock edge transition ', Split transaction ','several bus masters ', 'burst transfer '.The bus arbiter ensures that only one bus master at a time is allowed to initiate data transfers. Here we have proposed and implemented the reconfigurable arbitration algorithm, such as highest priority or fair access and round robin can be implemented depending on the application requirements. The design architecture is written using VHDL(Very High Speed Integrated Circuits Hardware Description Language) code using Xilinx ISE Tools. The architecture is modeled and synthesized using RTL(Register Transfer Level) abstraction and Implemented on Virtex2 series.","PeriodicalId":294850,"journal":{"name":"2011 International Conference on Communication Systems and Network Technologies","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-06-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115044896","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
An Improved Image Contrast Enhancement Based on Histogram Equalization and Brightness Preserving Weight Clustering Histogram Equalization 基于直方图均衡化和保亮权聚类直方图均衡化的改进图像对比度增强
R. Chauhan, S. Bhadoria
{"title":"An Improved Image Contrast Enhancement Based on Histogram Equalization and Brightness Preserving Weight Clustering Histogram Equalization","authors":"R. Chauhan, S. Bhadoria","doi":"10.1109/CSNT.2011.128","DOIUrl":"https://doi.org/10.1109/CSNT.2011.128","url":null,"abstract":"Intensity transformation function based on information extracted from image intensity histogram play a basic role in image processing, in areas such as enhancement. Histogram equalization (HE) is a conventional method for image contract enhancement. Histogram equalization improved the contrast of image by changing the intensity level of the pixel based on the intensity distribution of the input image. However, Histogram equalization has some disadvantage. Therefore, \"Brightness preserving weight clustering histogram equalization\" (BPWCHE) showed that BPWCHE can preserve image brightness and enhance visualization of image more effectively than Histogram equalization method.","PeriodicalId":294850,"journal":{"name":"2011 International Conference on Communication Systems and Network Technologies","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-06-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132268241","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 36
An Efficient Method to Factorize the RSA Public Key Encryption 一种有效的RSA公钥加密分解方法
B. R. Ambedkar, Pratiksha Gautam, Ashwani Gupta, S. Bedi
{"title":"An Efficient Method to Factorize the RSA Public Key Encryption","authors":"B. R. Ambedkar, Pratiksha Gautam, Ashwani Gupta, S. Bedi","doi":"10.1109/CSNT.2011.29","DOIUrl":"https://doi.org/10.1109/CSNT.2011.29","url":null,"abstract":"The security of public key encryption such as RSA scheme relied on the integer factoring problem. The security of RSA algorithm based on positive integer N, which is the product of two prime numbers, the factorization of N is very intricate. In this paper a factorization method is proposed, which is used to obtain the factor of positive integer N. The present work focuses on factorization of all trivial and nontrivial integer numbers as per Fermat method and requires fewer steps for factorization process of RSA modulus N. By experimental results it has been shown that factorization speed becomes increasing as compare to traditional Trial Division method.","PeriodicalId":294850,"journal":{"name":"2011 International Conference on Communication Systems and Network Technologies","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-06-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133231280","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 40
Comparative Analysis of Methods for Distribution of Certificate Revocation Information in Mobile Environment 移动环境下证书撤销信息分发方法的比较分析
M. Ingle, M. Kumar
{"title":"Comparative Analysis of Methods for Distribution of Certificate Revocation Information in Mobile Environment","authors":"M. Ingle, M. Kumar","doi":"10.1109/CSNT.2011.42","DOIUrl":"https://doi.org/10.1109/CSNT.2011.42","url":null,"abstract":"Mobile Systems have been emerged as a means to provide a new stream of data related services such as wireless internet, video calling, and mobile commerce activities. Now a days, public key infrastructure (PKI) has been evolved into wireless PKI to secure these data related services in wireless scenario. PKI involves application of public key cryptography while generating the digital certificates in a secured manner. The validation of these certificates guarantees secured usage of digital certificates. Various schemes have been reported in the literature for certificate validation, for example Certificate Revocation List. These certificate validation schemes may be described on the bases of distributing certificate status information. The two prominent mechanisms for distributing certificate status information are push and pull mechanism. In this paper, we study two method as Certificate Revocation List Distribution Service (CRL-DS) and Super Peer method for distributing CRL through the push and pull mechanism respectively. The paper analyses these two methods from the wireless perspective.","PeriodicalId":294850,"journal":{"name":"2011 International Conference on Communication Systems and Network Technologies","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-06-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127092751","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A Methodology for Extracting Head Contents from Meaningful Tables in Web Pages 一种从网页中有意义的表格中提取标题内容的方法
Madhuri M. Chavan, S. Shirgave
{"title":"A Methodology for Extracting Head Contents from Meaningful Tables in Web Pages","authors":"Madhuri M. Chavan, S. Shirgave","doi":"10.1109/CSNT.2011.66","DOIUrl":"https://doi.org/10.1109/CSNT.2011.66","url":null,"abstract":"Tables are an important feature of presenting information & are widely used on the web. They show relational data in a simple & precise manner. A typical web page consists of many blocks or areas e.g. main content areas, advertisements, images etc. Tables contain meaningful information. Almost all data is arranged in tabular format. Tables describe relational information in a compact manner. So there is need to find out the tables which contains meaningfulness structural data. In this paper, a method is introduced for determining the meaningfulness of a table and extracting the Head from meaningful table.","PeriodicalId":294850,"journal":{"name":"2011 International Conference on Communication Systems and Network Technologies","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-06-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126366141","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
New Data Hiding Algorithm in MATLAB Using Encrypted Secret Message 基于加密秘密消息的MATLAB数据隐藏新算法
A. Dutta, Abhirupa Sen, Sankar Das, Shalabh Agarwal, A. Nath
{"title":"New Data Hiding Algorithm in MATLAB Using Encrypted Secret Message","authors":"A. Dutta, Abhirupa Sen, Sankar Das, Shalabh Agarwal, A. Nath","doi":"10.1109/CSNT.2011.64","DOIUrl":"https://doi.org/10.1109/CSNT.2011.64","url":null,"abstract":"In the present work the authors have introduced a new method for hiding any encrypted secret message inside a cover file. For encrypting secret message the authors have introduced a new bit exchange algorithm. For hiding secret message Nath et al(1,2,3) have already proposed various methods. Here the authors modified the steganographic method. Instead of changing the LSB of the cover file at a stretch the authors proposed to change LSB and LSB+3 bits and changing alternate bytes of the cover file. It means to hide one byte of secret message the authors used 8 bytes of the cover file but out of 8 bytes 4 bytes were modified in LSB and LSB+3 bit positions and the alternate bytes remain unchanged. The secret message was encrypted by using a simple bit exchange method before the actual embedding process starts. The number of times the secret message to be encrypted using bit exchange method can be controlled by the user. The proposed bit exchange method is reversible that means the way the encryption done the decryption to be done in reverse way. The entire work was done in MATLAB. The authors applied the present steganography algorithm on different cover files such as image file, audio file, video file, word file, Excel file, Power point file,.exe file and in every case the result found was satisfactory. To embed any secret message inside a cover file the user has to enter a password and the same password to be used to unhide the secret message. The authors propose that this method could be most appropriate for hiding any file in any standard or non standard cover file such as word, excel, .ppt, .exe, image, audio, video files. The hidden message is encrypted using some bit exchange method and hence it will be almost impossible for the intruder to unhide the actual secret message from the embedded cover file. This method may be used for sending some secret key to someone over mail as the intruder may not be able to unhide and to decrypt the secret message.","PeriodicalId":294850,"journal":{"name":"2011 International Conference on Communication Systems and Network Technologies","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-06-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131246016","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 22
Enhancement of Noisy Speech Signals for Hearing Aids 增强助听器的噪音语音信号
Anuradha R. Fukane, S. Sahare
{"title":"Enhancement of Noisy Speech Signals for Hearing Aids","authors":"Anuradha R. Fukane, S. Sahare","doi":"10.1109/CSNT.2011.105","DOIUrl":"https://doi.org/10.1109/CSNT.2011.105","url":null,"abstract":"it is very difficult to understand speech signals in presence of background noise for the normal listeners and hearing impaired persons. The human speech and hearing organ is inherently sensitive to interfering noise. Interfering noise decreases speech intelligibility and quality which makes speech communication troublesome and causing human mistakes. Speech signals from the uncontrolled environments may contain degradation components along with the required speech components. Speech enhancement algorithms removes or reduces the noise and improve one or more perceptual aspects of noisy speech most notably quality and intelligibility. This paper reports a performance evaluation of Spectral subtraction algorithm and its modified versions for Hearing aids in different environments such as restaurant, train and Car environments. Clean speech signals are corrupted by background noise respectively multi-talker babble noise, train noise, and car engine noise at four different signal-to-noise ratio levels-2dB, 0dB, 5dB, 10dB. Subjective and objective type evaluation of enhanced speech signals were carried out. The evaluation of intelligibility and quality of enhanced speech is reported for hearing Aids. Section I introduction, section II explains basic block diagram of speech enhancement, explains basic Spectral subtraction speech enhancement algorithm in detail and its various modified versions of spectral subtraction algorithm, section III explains performance evaluation of this speech enhancement algorithms in terms of quality and intelligibility for Hearing aid, section-IV conclusion.","PeriodicalId":294850,"journal":{"name":"2011 International Conference on Communication Systems and Network Technologies","volume":"103 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-06-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126832908","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
A Generic Structure of Object Classification Using Genetic Programming 一种基于遗传规划的对象分类通用结构
A. S. Tamboli, M. Shah
{"title":"A Generic Structure of Object Classification Using Genetic Programming","authors":"A. S. Tamboli, M. Shah","doi":"10.1109/CSNT.2011.154","DOIUrl":"https://doi.org/10.1109/CSNT.2011.154","url":null,"abstract":"In This paper a method for classification of two types of objects using genetic programming (GP) has been presented. These two objects are coins of different sizes, and different textures. The basic algorithm of genetic programming was presented and explained. The features used for training and testing are mean, standard deviation, skewness and kurtosis. Precision and recall were used as performance measures and they were the main building blocks in building the fitness function. They replaced the false alarm and detection rate that was used in previous works. The result figures as well as values of precision, recall, fitness values, time elapsed, and number of generations used in training was presented. The very basic structure of a GP system was implemented and proved that it can work well as a standalone computational algorithm.","PeriodicalId":294850,"journal":{"name":"2011 International Conference on Communication Systems and Network Technologies","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-06-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125676963","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信