2015 Fifth International Conference on Communication Systems and Network Technologies最新文献

筛选
英文 中文
Secure MQTT for Internet of Things (IoT) 物联网(IoT)安全MQTT
M. Singh, Rajan Ma, Shivraj Vl, B. P.
{"title":"Secure MQTT for Internet of Things (IoT)","authors":"M. Singh, Rajan Ma, Shivraj Vl, B. P.","doi":"10.1109/CSNT.2015.16","DOIUrl":"https://doi.org/10.1109/CSNT.2015.16","url":null,"abstract":"Rapid innovations in the area of digital things and Information Communication Technology are driving rapid deployment of Internet of Things (IoT) around the globe. Device to Device communications (D2D) in IoT are envisaged through various protocols such as Constrained Access Protocol (CoAP), Message Queue Telemetry Transport (MQTT) and MQTT-SN (for sensor networks). One of the major concerns in the deployment of IoT is to ensure the security of devices and D2D communications. Besides, existing communication protocols for IoT are devoid of security features. To address this, we propose a secure version of MQTT and MQTT-SN protocols (SMQTT and SMQTT-SN) in which security feature is augmented to the existing MQTT protocol based on Key/Cipher text Policy-Attribute Based Encryption(KP/CP-ABE) using lightweight Elliptic Curve Cryptography. Further we demonstrate feasibility of SMQTT and SMQTT-SNprotocols for various IoT requirements through simulations and evaluate their performance.","PeriodicalId":334733,"journal":{"name":"2015 Fifth International Conference on Communication Systems and Network Technologies","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116383328","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 289
Mathematical Modeling of Permanent Magnet Brushless DC Motor for Electric Scooter 电动滑板车用永磁无刷直流电动机数学建模
Prakhyath Shetty, A. K. Nitin Subramonium, M. Kumar
{"title":"Mathematical Modeling of Permanent Magnet Brushless DC Motor for Electric Scooter","authors":"Prakhyath Shetty, A. K. Nitin Subramonium, M. Kumar","doi":"10.1109/CSNT.2015.110","DOIUrl":"https://doi.org/10.1109/CSNT.2015.110","url":null,"abstract":"Permanent magnet brushless dc (PMBLDC) motors are successfully developed to find the wide application in low power automotives due to high efficiency, silent operation, compact size, lower maintenance and high reliability. Due to the advancement in power electronics, PM Brushless dc motors have become potential drive for automotive applications. This paper mainly deals on simulation using Mat lab / Simulink for mathematical model of the PMBLDC motor for electric scooter application. The steady state and transient models of PMBLDC motor is analyzed for efficient performance of control. The transfer function of the motor is derived to arrive at the stability of the motor. The communication system and network topology of the motor drive is discussed and presented.","PeriodicalId":334733,"journal":{"name":"2015 Fifth International Conference on Communication Systems and Network Technologies","volume":"907 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116403999","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A NLMS Based Approach for Artifacts Removal in Multichannel EEG Signals with ICA and Double Density Wavelet Transform 基于NLMS的多通道脑电信号伪影去除方法及双密度小波变换
Vandana Roy, S. Shukla
{"title":"A NLMS Based Approach for Artifacts Removal in Multichannel EEG Signals with ICA and Double Density Wavelet Transform","authors":"Vandana Roy, S. Shukla","doi":"10.1109/CSNT.2015.61","DOIUrl":"https://doi.org/10.1109/CSNT.2015.61","url":null,"abstract":"Presence of artifacts in electroencephalogram (EEG) signals is significant hurdles in analysis of spectral behavior. These artifacts are the low amplitude signals from unconscious ocular activity and muscles activity of human body. Since the source and noise in received signals originate from different sources, ICA method has been extensively revised for proper filtering. It involves the generating a set of individual components of given signal followed by rejection of unwanted artifacts. The results of this research show that considerable artifacts components persist in clean EEG signals. In this paper, we propose Double-Density DWT algorithm as the overhead computation with ICA for further filtering the signals. ICA segments the artifact peaks and DWT decompose them for suitable signal value. The Wavelet ICA suppression not only remove artifacts but also preserves the spectral (amplitude) and coherence (phase) characteristics of neural activity. In addition to this, NLMS filter is used at output of DWT to discard any trace of artifacts left in signal. The comparison of proposed scheme and conventional ICA indicates that NLMS filtered DWT-ICA outperforms the previous methods.","PeriodicalId":334733,"journal":{"name":"2015 Fifth International Conference on Communication Systems and Network Technologies","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126580486","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Identifying Most Significant Genes on Imputed Gene Expression Dataset 在输入的基因表达数据集上识别最重要的基因
Pranoti R. Kamble, Rakhi D. Wajgi, M. Kshirsagar
{"title":"Identifying Most Significant Genes on Imputed Gene Expression Dataset","authors":"Pranoti R. Kamble, Rakhi D. Wajgi, M. Kshirsagar","doi":"10.1109/CSNT.2015.187","DOIUrl":"https://doi.org/10.1109/CSNT.2015.187","url":null,"abstract":"Due to advance research in the field of Microarray technology large amount of gene expressions are generated. These gene dataset helps in getting more insight of cells and their functioning. While capturing gene expressions noise get added in the dataset. For the accuracy of downstream analysis it is necessary to preprocess this data. This helps in accurately identifying most significant and co-expressing genes. In this paper, we have implemented USQR algorithm for data reduction after applying normalization and discretization. We have used serum dataset containing 1700 genes.","PeriodicalId":334733,"journal":{"name":"2015 Fifth International Conference on Communication Systems and Network Technologies","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125667209","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Distributed Power Control for Energy Saving in Device-to-Device Communication Underlaying Cellular Network from Game Perspective 基于博弈视角的蜂窝网络设备间通信节能分布式电源控制
Rui Tang, Jiaojiao Dong, J. Liu, Zhengcang Zhu, Ji-hong Zhao, Hua Qu
{"title":"Distributed Power Control for Energy Saving in Device-to-Device Communication Underlaying Cellular Network from Game Perspective","authors":"Rui Tang, Jiaojiao Dong, J. Liu, Zhengcang Zhu, Ji-hong Zhao, Hua Qu","doi":"10.1109/CSNT.2015.34","DOIUrl":"https://doi.org/10.1109/CSNT.2015.34","url":null,"abstract":"Device-to-Device (D2D) communication is proposed as a promising remedy to improve the quality-of-service (QoS) for communicating user equipments (UEs) in proximity by reusing the spectrum of cellular system. Meanwhile, energy conservation receives great attention for D2D UEs owing to the battery-driven feature and undesirable cross-tier interference. So, we leverage about performance tradeoff and attempt to minimize the power consumption for D2D communication via distributed power control (DPC). We apply non-cooperative game with pricing among D2D players in their pursuit of QoS requirements. Under any pricing, the existence and uniqueness of Nash Equilibrium (NE) are verified, and the convergence of the power updating is also proved. Besides, we adjust the price value to maintain the QoS requirement for primary cellular UE. Specifically, a novel user removal scheme is introduced to softly remove the players in unfavorable condition by setting a low QoS target when feasibility can't be guaranteed. Finally, we elucidate the efficacy of our scheme in terms of aggregate power consumption and system capacity (SC), i.e., The number of admitted D-links, which shows the necessity and superiority of our performance tradeoff.","PeriodicalId":334733,"journal":{"name":"2015 Fifth International Conference on Communication Systems and Network Technologies","volume":"65 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126078315","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Performance Analysis of Uniform Meta-material Lens Embedded U-shape Slotted Patch Antennas 均匀超材料透镜内嵌u型开槽贴片天线的性能分析
Jaypal Baviskar, A. Jeyakumar
{"title":"Performance Analysis of Uniform Meta-material Lens Embedded U-shape Slotted Patch Antennas","authors":"Jaypal Baviskar, A. Jeyakumar","doi":"10.1109/CSNT.2015.281","DOIUrl":"https://doi.org/10.1109/CSNT.2015.281","url":null,"abstract":"This paper emphasizes on the emergence of Metamaterials in the field of antenna designing. For enhancing the performance of the antenna in terms of various parameters viz. gain, directivity, main lobe and side lobe levels, bandwidth; metamaterials are used as an uniform flat lens along with the antenna. A novel 'U' shape slotted patch antenna & its array of 2×2 is designed for 2.4 GHz frequency band and simulated using CST software. The performance evaluation of these antennas with and without the meta-material is illustrated. Embedding the meta-material lens with array results in improvement of the gain (18.57%), directivity (25.31%). It also reduces the return losses by 1dB and enhances the bandwidth by 4.69%.","PeriodicalId":334733,"journal":{"name":"2015 Fifth International Conference on Communication Systems and Network Technologies","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125429499","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Noise Tolerant Techniques in Dynamic CMOS Logic Style: A Review Paper 动态CMOS逻辑模式的容噪技术综述
M. Manzoor, Shekhar Verma, Mahwash Manzoor
{"title":"Noise Tolerant Techniques in Dynamic CMOS Logic Style: A Review Paper","authors":"M. Manzoor, Shekhar Verma, Mahwash Manzoor","doi":"10.1109/CSNT.2015.77","DOIUrl":"https://doi.org/10.1109/CSNT.2015.77","url":null,"abstract":"Dynamic logic style is mainly used for high fan in and high performance circuits because of its smaller area and fast superior speed. This style comes with a problem of low noise margin which makes it more susceptible to noise than static CMOS circuits. It also faces some charge sharing and leakage problems. A small amount of noise at the input can cause an undesirable change at the output. Domino logic (dynamic logic with an inverter at the output) also faces this problem. This paper consists of an overview of various noise tolerant techniques for dynamic logic explaining their functioning and reliability for comb acting noise.","PeriodicalId":334733,"journal":{"name":"2015 Fifth International Conference on Communication Systems and Network Technologies","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127851201","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Performance Analysis and Quality-of-Service Monitoring of Protected and Unprotected TCP Networks Using NCTUns Simulator 利用NCTUns模拟器对受保护和未受保护TCP网络进行性能分析和服务质量监控
P. Tyagi, D. Dembla
{"title":"Performance Analysis and Quality-of-Service Monitoring of Protected and Unprotected TCP Networks Using NCTUns Simulator","authors":"P. Tyagi, D. Dembla","doi":"10.1109/CSNT.2015.17","DOIUrl":"https://doi.org/10.1109/CSNT.2015.17","url":null,"abstract":"The research trends in computer and wireless communication networks are growingly facilitated with the emergence of various Network Simulation tools. Network simulation software enables users to model network behavior demonstrating the packet transmission behavior and interaction amongst the nodes. These models are further used to analyze and predict the behavior of a computer network on various devices such as links and applications. Network Simulators also permit these network topologies to be studied and tested on several popular protocols such as WLAN, Wi-Max, TCP, WSN, cognitive radio. This paper analyses the performance and quality-of service of packet flow in TCP networks in VANET using novel network simulator and emulator known as NCTUns. The investigation and study of various VANET topologies is facilitated by NCTUns architecture, simulation methodology, functional design and execution steps. NCTUns offers a series of advantages over other contemporary network simulators where the outcomes of diverse quality of service (QoS) and resource management and schemes implemented on higher-layer protocols can be easily studied. Most importantly, NCTUns allows testing of time-consuming, complex or extravagant topologies without emulating them using hardware. This paper reviews Diffserv model used for monitoring packet flows in TCP architecture and gives an insight into the analysis of such networks.","PeriodicalId":334733,"journal":{"name":"2015 Fifth International Conference on Communication Systems and Network Technologies","volume":"42 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127987699","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Integrated FRTCP: Fair and Reliable Transmission Control Protocol for Ad Hoc Networks 集成FRTCP: Ad Hoc网络公平可靠的传输控制协议
T. K. Mishra, S. Tripathi
{"title":"Integrated FRTCP: Fair and Reliable Transmission Control Protocol for Ad Hoc Networks","authors":"T. K. Mishra, S. Tripathi","doi":"10.1109/CSNT.2015.71","DOIUrl":"https://doi.org/10.1109/CSNT.2015.71","url":null,"abstract":"In an ad - hoc network, major challenging work is to maintain fairness among multiple flows in heterogeneous applications. The proposed solutions in the available literature are mostly based on the first come first out (FIFO) queuing which dispatch packets according to the priority of the packet, based on its type of application or region of the source node. As a result, packets having lower priority cannot reach to the destination even if they are originated from the source node since a long time, and dropped over there because of starvation in a given queue. So an efficient scheduling algorithm must be framed for achieving per flow fairness in heterogeneous applications of ad hoc network. In this paper, we propose an integrated priority measurement technique for fairness among multiple flows. In addition to this, the protocol addresses multiple flow transport events from different sources to sink nodes with overall minimum latency. Performance evaluation of this protocol moderates the end to end latency to the flows having lower priority.","PeriodicalId":334733,"journal":{"name":"2015 Fifth International Conference on Communication Systems and Network Technologies","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129041260","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Modelling and Computation of Silicone Rubber Deformation Adapting Neo-Hookean Constitutive Equation 基于新hookean本构方程的硅橡胶变形建模与计算
S. Noor, J. Mahmud
{"title":"Modelling and Computation of Silicone Rubber Deformation Adapting Neo-Hookean Constitutive Equation","authors":"S. Noor, J. Mahmud","doi":"10.1109/CSNT.2015.276","DOIUrl":"https://doi.org/10.1109/CSNT.2015.276","url":null,"abstract":"In skin research area particularly on the development of skin substitutes or synthetic skin, the determination of the mechanical properties of skin and hyperelastic materials has always been challenging but yet interesting to be explored. To date there is no appropriate model ideally used to denote the skin. Known as a potential skin substitute material, Silicone rubber behaviour is also difficult to characterise. Therefore, this study for the first time attempts to assess the deformation behaviour of silicone rubber materials via the experimental approach, along with modelling and computation adapting hyperelastic constitutive model (i.e. neo-Hookean). Initially, uniaxial tensile test is performed to measure the stress-stretch response silicone rubber based materials employing ASTM D412 testing standards. All samples behave in a similar way and this data is acceptable as it possesses a slight percentage of variance which is less than 5% showing the consistency of the experiment performed. Neo- Hookean hyperelastic constitutive equation has been adopted to represent the materials behaviour in terms of materials constant. The experimental stress-stretch data were used as an input in order to analytically compute the materials constant of silicone rubber. Engineering stress-stretch (δE-λ) curve plot from analytical results has been fitted to the experimental data curve plot. Results indicate that the neo-Hookean model is capable to provide reliable data in describing the deformation behaviour of Silicone Rubber based materials. The neo- Hookean material constant (C1) value is found to be 1.3078 MPa. Therefore it can be concluded that neo-Hookean constitutive model is suitable in representing the deformation behaviour of silicone rubber materials. Also the current study has contributed significantly to the knowledge of potential skin substitute materials especially for silicone rubber materials in modelling and computing its deformation behaviour.","PeriodicalId":334733,"journal":{"name":"2015 Fifth International Conference on Communication Systems and Network Technologies","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130644330","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信