2011 International Conference on Communication Systems and Network Technologies最新文献

筛选
英文 中文
A New Framework for Credit Card Transactions Involving Mutual Authentication between Cardholder and Merchant 涉及持卡人与商户相互认证的信用卡交易新框架
Shalini Gupta, R. Johari
{"title":"A New Framework for Credit Card Transactions Involving Mutual Authentication between Cardholder and Merchant","authors":"Shalini Gupta, R. Johari","doi":"10.1109/CSNT.2011.12","DOIUrl":"https://doi.org/10.1109/CSNT.2011.12","url":null,"abstract":"Electronic Commerce (e-Commerce) and ease in the onsite transactions have led to the exponential growth in the acceptance of credit cards among consumers of all the sections. But despite their remarkable advantages, consumers are still reluctant in their use, especially for online transactions and reason being the increasing credit card fraud rate. A number of security models have been proposed and deployed for secure online transactions but the sharing of sensitive credit card data over the Internet has made online transactions vulnerable to threats. In this paper, we discuss and analyze the current developments in online authentication procedures including biometrics, one-time-password systems and use of mobile device and Public Switched Telephone Network for cardholder authentication. Then we propose a complete new framework for both onsite and online (Internet shopping) credit card transactions. This framework is more secure, robust, enhances user privacy and does not involve the deployment of special hardware systems at the customer's site.","PeriodicalId":294850,"journal":{"name":"2011 International Conference on Communication Systems and Network Technologies","volume":"86 4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-06-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116307271","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 35
Pyrometric Human Presense Detection System 高温人体存在检测系统
Shreyansh Jain, G. Tomar
{"title":"Pyrometric Human Presense Detection System","authors":"Shreyansh Jain, G. Tomar","doi":"10.1109/CSNT.2011.90","DOIUrl":"https://doi.org/10.1109/CSNT.2011.90","url":null,"abstract":"A simple model has been planned for human presence sensing in a closed room using a scanning type pyrometric detector, embedded system and intelligent software. Sensors are to be mounted on a rotating platform for scanning of the field of view at regular intervals and at slow speed. This concept is intended to monitor movements of human at desired location and activate equipment accordingly.","PeriodicalId":294850,"journal":{"name":"2011 International Conference on Communication Systems and Network Technologies","volume":"148 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-06-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123777236","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Performance Analysis of AES and TwoFish Encryption Schemes AES和TwoFish加密方案的性能分析
S. Rizvi, S. Z. Hussain, N. Wadhwa
{"title":"Performance Analysis of AES and TwoFish Encryption Schemes","authors":"S. Rizvi, S. Z. Hussain, N. Wadhwa","doi":"10.1109/CSNT.2011.160","DOIUrl":"https://doi.org/10.1109/CSNT.2011.160","url":null,"abstract":"The two main characteristics of a good encryption algorithm are: Security and Speed. Usually security algorithms have to be embedded in a variety of applications like e-banking, online shopping, mails etc. So they should be fast as well as secure in different environments. In this paper, we do security v/s performance analysis of two algorithms Two fish and AES. First, we will discuss security issues of both algorithms by considering their safety factor. Then we study encryption speed of both algorithms by encrypting different type of data (text, image, audio) and analyze their performance in terms of throughput of every algorithm on different size of RAMs. The results show the relationship between performance of algorithms and size of RAM and type of data.","PeriodicalId":294850,"journal":{"name":"2011 International Conference on Communication Systems and Network Technologies","volume":"218 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-06-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126115692","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 36
A Simple Single Seeded Region Growing Algorithm for Color Image Segmentation using Adaptive Thresholding 基于自适应阈值分割的彩色图像单种子区域生长算法
O. Verma, M. Hanmandlu, Seba Susan, M. Kulkarni, P. Jain
{"title":"A Simple Single Seeded Region Growing Algorithm for Color Image Segmentation using Adaptive Thresholding","authors":"O. Verma, M. Hanmandlu, Seba Susan, M. Kulkarni, P. Jain","doi":"10.1109/CSNT.2011.107","DOIUrl":"https://doi.org/10.1109/CSNT.2011.107","url":null,"abstract":"In this paper, we present a region growing technique for color image segmentation. Conventional image segmentation techniques using region growing requires initial seeds selection, which increases computational cost & execution time. To overcome this problem, a single seeded region growing technique for image segmentation is proposed, which starts from the center pixel of the image as the initial seed. It grows region according to the grow formula and selects the next seed from connected pixel of the region. We use intensity based similarity index for the grow formula and Otsu's Adaptive thresholding is used to calculate the stopping criteria for the grow formula. We apply the proposed method to the Berkley segmentation database images and discuss results based on Liu's F-factor that shows efficient segmentation.","PeriodicalId":294850,"journal":{"name":"2011 International Conference on Communication Systems and Network Technologies","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-06-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125224029","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 71
A Proposed Feature Extraction Technique for Dental X-Ray Images Based on Multiple Features 一种基于多特征的牙科x射线图像特征提取方法
J. Raju, C. Modi
{"title":"A Proposed Feature Extraction Technique for Dental X-Ray Images Based on Multiple Features","authors":"J. Raju, C. Modi","doi":"10.1109/CSNT.2011.116","DOIUrl":"https://doi.org/10.1109/CSNT.2011.116","url":null,"abstract":"In recent years, the need for personal identification systems has increased in cases of severe accidents and calamities for criminal investigation. Biometric identification systems can be used for gaining access to systems and verification purpose. However, biometrics such as iris, fingerprint, etc. are vulnerable to early decay and decomposition. On the other hand, dental x rays remain invariant over time and resist early decomposition, fire, etc. Hence they can be used for human identification purpose. In this paper, a novel approach to feature extraction of dental x-ray radiograph is proposed based on the shape and texture of extracted tooth from the radiograph and thereafter matching is done by finding mean square error between the query and database images.","PeriodicalId":294850,"journal":{"name":"2011 International Conference on Communication Systems and Network Technologies","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-06-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127993066","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
Backstepping Control of Discrete-Time Nonlinear System Under Unknown Dead-zone Constraint 未知死区约束下离散非线性系统的反演控制
V. Deolia, S. Purwar, T. Sharma
{"title":"Backstepping Control of Discrete-Time Nonlinear System Under Unknown Dead-zone Constraint","authors":"V. Deolia, S. Purwar, T. Sharma","doi":"10.1109/CSNT.2011.78","DOIUrl":"https://doi.org/10.1109/CSNT.2011.78","url":null,"abstract":"This paper proposes the adaptive back stepping controller for a class of nonlinear discrete-time systems in strict-feedback form with unknown dead-zone using neural networks. The control design is attained by introducing the dead-zone nonlinearity and using it in the controller design with back stepping technique. A dead-zone inverse is developed to compensate the dead-zone effect in nonlinear systems. In this scheme, Chebyshev Neural Network (CNN) is used to approximate the unknown nonlinear functions and also used to compensate the dead-zone nonlinearity. New weight updates laws are derived to guarantee uniform ultimate boundedness (UUB) for all signals in closed loop system.","PeriodicalId":294850,"journal":{"name":"2011 International Conference on Communication Systems and Network Technologies","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-06-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125136955","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Dual-Band Dielectric Rod Antenna for Satellite Communication System 用于卫星通信系统的双频介质杆天线
K. Kumar, Jagmeet Singh Sandhu, Bharat Bisht, Pragya Gupta, G. Singh
{"title":"Dual-Band Dielectric Rod Antenna for Satellite Communication System","authors":"K. Kumar, Jagmeet Singh Sandhu, Bharat Bisht, Pragya Gupta, G. Singh","doi":"10.1109/CSNT.2011.59","DOIUrl":"https://doi.org/10.1109/CSNT.2011.59","url":null,"abstract":"In this paper, we have simulated the dielectric rod antenna by using CST microwave studio which is commercially available simulator based on finite integral technique for satellite communication system. We emphasize particularly, on the gain of the proposed antenna at two frequencies that is from 25GHz to 35 GHz. The radiation mechanism of the dielectric rod antenna is based on the discontinuity radiation concept in which the antenna is regarded as an array composed of two effective sources at the feed end and free end of the rod.","PeriodicalId":294850,"journal":{"name":"2011 International Conference on Communication Systems and Network Technologies","volume":"84 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-06-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129224061","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Organic Thin Film Transistor Architecture, Parameters and their Applications 有机薄膜晶体管的结构、参数及其应用
P. Mittal, B. Kumar, Y. S. Negi, B. Kaushik, R.K. Singh
{"title":"Organic Thin Film Transistor Architecture, Parameters and their Applications","authors":"P. Mittal, B. Kumar, Y. S. Negi, B. Kaushik, R.K. Singh","doi":"10.1109/CSNT.2011.96","DOIUrl":"https://doi.org/10.1109/CSNT.2011.96","url":null,"abstract":"Organic Thin Film Transistors (OTFTs) are promising devices for future development of variety of low-cost and large-area electronics applications such as flexible displays. This paper analyzes the performance of OTFT made of several organic semi conducting and insulating materials and further discusses their applications. Analysis of previous research work demonstrates that the mobility in OTFT decreases when the product of semi conducting film thickness and gate capacitance per unit area increases. The decrease is specified by a power law function with parameters for several organic semiconductors. OTFT characteristics have undergone spectacular improvements during the last few years. This paper explores the effect of variation of channel length from 40 nm to 20 nm on drain current for pentacene bottom contact structure. Variations in these quantities maps to variations in the electrical behaviour of devices. It has been found that drain current increases due to decrease in length of organic thin film conducting channel. It reviews recent progress in parameter properties for device designs and applications related to OTFTs. The performance of OTFTs is evaluated in terms of mobility, on/off current ratio, threshold voltage and sub threshold slope. This paper thoroughly discusses the overall performance and applications of OTFTs in various fields.","PeriodicalId":294850,"journal":{"name":"2011 International Conference on Communication Systems and Network Technologies","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-06-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115727155","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 35
Part of Speech Tagging for Hindi Corpus 印地语语料库的词性标注
N. Mishra, Amit Mishra
{"title":"Part of Speech Tagging for Hindi Corpus","authors":"N. Mishra, Amit Mishra","doi":"10.1109/CSNT.2011.118","DOIUrl":"https://doi.org/10.1109/CSNT.2011.118","url":null,"abstract":"The wide utilization of internet for making search of information has got emerging use of computational linguistics as most of the search systems uses bag of words mode which causes problem in retrieval due to polysemy, homonymy, synonymy[9][3]. This has lead to shift in the accepted boundary between what kinds of query information are submitted by humans and what kinds further intreprations in form of annotation of query information can be done so as to get better results[1][4]. In this regards the process of annotating the words in a text in accordance to a particular part of speech is the objective of this paper. further POS tagging is much tougher than making a list of words and their parts of speech, as most words tend to have more than one part of speech in different scenarios and some parts of speech of these words are rather complex or unspoken[5] [6]. There are large numbers of POS tagger available for english language which has got satisfactory performance but cannot be applied to hindi language due to structural differences[8]. This paper aims at part of speech tagging for hindi corpus as large no of hindi documents are growing on internet.","PeriodicalId":294850,"journal":{"name":"2011 International Conference on Communication Systems and Network Technologies","volume":"11 8","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-06-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113955790","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 29
Human Identification by Partial Iris Segmentation Using Pupil Circle Growing Based on Binary Integrated Edge Intensity Curve 基于二值积分边缘强度曲线瞳孔圆生长的部分虹膜分割人脸识别
Hemal U. Patel, C. Modi, M. Paunwala, S. Patnaik
{"title":"Human Identification by Partial Iris Segmentation Using Pupil Circle Growing Based on Binary Integrated Edge Intensity Curve","authors":"Hemal U. Patel, C. Modi, M. Paunwala, S. Patnaik","doi":"10.1109/CSNT.2011.76","DOIUrl":"https://doi.org/10.1109/CSNT.2011.76","url":null,"abstract":"Identification of human based on iris has gained increased attention in recent years. The paper focuses on novel and efficient approach of partial iris based recognition of human using pupil circle region growing and binary integrated edge intensity curve which defeats the difficulties of eyelids occlusions. The experimental results are obtained on CASIA database version-1 and show good performance with EER of 5.14%. The advantage of the proposed approach is its computational simplicity and good recognition accuracy as it avoids the eyelids portion from the iris region for further processing.","PeriodicalId":294850,"journal":{"name":"2011 International Conference on Communication Systems and Network Technologies","volume":"295 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-06-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115321358","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信