2017 2nd IEEE International Conference on Recent Trends in Electronics, Information & Communication Technology (RTEICT)最新文献

筛选
英文 中文
Model following active suspension system using inertial delay control 采用惯性延迟控制的主动悬架系统建模
Geeta A. Bokil, D. B. Salunke, D. Ingale, S. Phadke
{"title":"Model following active suspension system using inertial delay control","authors":"Geeta A. Bokil, D. B. Salunke, D. Ingale, S. Phadke","doi":"10.1109/RTEICT.2017.8256561","DOIUrl":"https://doi.org/10.1109/RTEICT.2017.8256561","url":null,"abstract":"In this paper an active suspension system is designed using inertial delay control for estimating the effect of uncertainties in suspension parameters, sprung mass variation and unknown road profile. The proposed control is designed with the objective of improving the ride comfort without having to use sensors for measuring the road profile or sensing the displacement and velocity of the unsprung mass. The design is validated by simulation for two road profiles and the performance is compared with passive suspension systems.","PeriodicalId":342831,"journal":{"name":"2017 2nd IEEE International Conference on Recent Trends in Electronics, Information & Communication Technology (RTEICT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131035353","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Multitier energy system review on secure intrusion detection system in MANETs 安全入侵检测系统的多层能量系统综述
Prasad P Rajendra, Shivashankar
{"title":"Multitier energy system review on secure intrusion detection system in MANETs","authors":"Prasad P Rajendra, Shivashankar","doi":"10.1109/RTEICT.2017.8256894","DOIUrl":"https://doi.org/10.1109/RTEICT.2017.8256894","url":null,"abstract":"Wireless communication networks is the most found networks in the recent years for the reason that it does not rely on any conventional infrastructure. Also, for all the users the network provides anytime and anywhere services where installing an infrastructure network is not possible as they are dynamic in nature. The challenges in the MANET is the Intrusion Detection Systems(IDS's) which follows the activities of authentication, non-repudiation, data integrity and confidentiality. These activity of IDS's will setback the networking system. This research paper discus a new parameter trust for securing the information in the network and allows the multitier energy system for the MANET. Also, the comparison of the different existing networks has been discussed and evaluated.","PeriodicalId":342831,"journal":{"name":"2017 2nd IEEE International Conference on Recent Trends in Electronics, Information & Communication Technology (RTEICT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131061818","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 33
Improving the network lifetime of a wireless sensor network using clustering techniques 利用聚类技术提高无线传感器网络的网络寿命
Shreya V. Basu, K. Ashwin, Nupur K. Neti, B. S. Premananda
{"title":"Improving the network lifetime of a wireless sensor network using clustering techniques","authors":"Shreya V. Basu, K. Ashwin, Nupur K. Neti, B. S. Premananda","doi":"10.1109/RTEICT.2017.8256922","DOIUrl":"https://doi.org/10.1109/RTEICT.2017.8256922","url":null,"abstract":"A wireless sensor network (WSN) is a network that consists of spatially distributed autonomous devices that use sensors to monitor the surrounding physical or environmental conditions. As WSNs are generally deployed over large areas or hostile environments, they are difficult to manage and monitor. Furthermore, the batteries cannot be easily recharged or replaced. This is a major drawback of a WSN. Clustering is an important method used for extending the lifetime of a network. It involves a cluster head (CH) which collects data from the cluster members (CMs) present in its cluster, and reports this data to the base station (BS). Thus, energy is conserved by sending data to the CH instead of the sink. An existing clustering technique for WSNs is the Low Adaptive Energy Clustering Hierarchy (LEACH). In this paper, the implementation of LEACH is discussed and an improvement of the LEACH model called Segmented LEACH is proposed. In order to further improve the network lifetime, the application of coalition game theory on a clustering algorithm is implemented. The simulation results show that the game theory model has a higher network lifetime, later first node death and lesser amount of energy consumption per node as compared to LEACH and Segmented LEACH model.","PeriodicalId":342831,"journal":{"name":"2017 2nd IEEE International Conference on Recent Trends in Electronics, Information & Communication Technology (RTEICT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130555276","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Outage performance analysis of pulse-shaped multicarrier waveform for 5G in frequency-selective fading environments 频率选择衰落环境下5G脉冲型多载波波形中断性能分析
Gouri Desai, Sanjay Deshmukh
{"title":"Outage performance analysis of pulse-shaped multicarrier waveform for 5G in frequency-selective fading environments","authors":"Gouri Desai, Sanjay Deshmukh","doi":"10.1109/RTEICT.2017.8256682","DOIUrl":"https://doi.org/10.1109/RTEICT.2017.8256682","url":null,"abstract":"This paper presents the outage performance of fifth generation (5G) candidate waveform, Generalized Frequency Division Multiplexing (GFDM), in LTE-A based frequency-selective channels (FSCs). With the advent of new standards for PHY layer modulation for 5G mobile communication systems, several advanced waveforms have been proposed to surpass Orthogonal Frequency Division Multiplexing (OFDM). GFDM shows great promise for applications in opportunistic cognitive radio in highly fragmented spectrum because of its flexible filtered multi-carrier structure and ultra-low out-of-band (OOB) leakage. The outage performance of GFDM system is considered for high user density scenarios at low-load and full-load conditions with un-coded transmission in LTE-A channel models and compared to OFDM. Analysis of simulation results suggests that GFDM achieves improved outage performance than OFDM, irrespective of system load, especially for Pedestrian-A channel. This novel perspective to looking at performance of GFDM provides a new dimension to its scope in TV white space based intelligent radio receivers.","PeriodicalId":342831,"journal":{"name":"2017 2nd IEEE International Conference on Recent Trends in Electronics, Information & Communication Technology (RTEICT)","volume":"293 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132269060","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A review of aligners for protein protein interaction networks 蛋白质相互作用网络对准子的研究进展
Anooja Ali, R. Viswanath, S. Patil, K. Venugopal
{"title":"A review of aligners for protein protein interaction networks","authors":"Anooja Ali, R. Viswanath, S. Patil, K. Venugopal","doi":"10.1109/RTEICT.2017.8256879","DOIUrl":"https://doi.org/10.1109/RTEICT.2017.8256879","url":null,"abstract":"Protein Protein Interaction (PPI) can be considered as network. Alignment is the process of mapping nodes from one network to another network. The main objective of network alignment is to identify small, well defined interactome units such as protein complexes or conserved pathways that are analogous in the input network. Network alignment uncovers the relationship between protein complexes and functions. Similarity between two graph structures can be identified by evaluating the topology. Network alignment identifies either topological or sequential similarity. Gene annotations reveal the functional or sequential similarity and it can be evaluated based on semantic similarity. In this paper, we review the various network aligners and classify them according to the methodologies. We discuss the different evaluation metrics and the popular databases of protein interactions.","PeriodicalId":342831,"journal":{"name":"2017 2nd IEEE International Conference on Recent Trends in Electronics, Information & Communication Technology (RTEICT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125409290","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
A low voltage low power four quadrant analog multiplier using submicron technology 采用亚微米技术的低电压低功率四象限模拟乘法器
Umadevi Gurram, Komal Mehna
{"title":"A low voltage low power four quadrant analog multiplier using submicron technology","authors":"Umadevi Gurram, Komal Mehna","doi":"10.1109/RTEICT.2017.8256752","DOIUrl":"https://doi.org/10.1109/RTEICT.2017.8256752","url":null,"abstract":"This paper presents a new four quadrant voltage mode analog multiplier using square rooting circuit. The proposed circuit can work for low voltage and low power applications as it uses flipped voltage follower cell. The circuit is designed using 0.18μm CMOS technology and its simulations have been carried out using Cadence Virtuoso environment. The circuit is operated under the supply voltage of 1V and the differential input signals peak to peak voltages of 40mV. The worst case power consumption has been measured from the simulation results as 14μW. Moreover −3dB bandwidth of the circuit has been found to be 530MHz. the operation of the multiplier as a frequency doubler is also verified.","PeriodicalId":342831,"journal":{"name":"2017 2nd IEEE International Conference on Recent Trends in Electronics, Information & Communication Technology (RTEICT)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126704324","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Sensitivity analysis of TRV in series compensated transmission lines 串联补偿输电线路中TRV的灵敏度分析
Satyam Chandankar, A. Bhole
{"title":"Sensitivity analysis of TRV in series compensated transmission lines","authors":"Satyam Chandankar, A. Bhole","doi":"10.1109/RTEICT.2017.8256718","DOIUrl":"https://doi.org/10.1109/RTEICT.2017.8256718","url":null,"abstract":"The characteristic of Transient Recovery Voltage includes Peak Amplitude & Rate of Rise of Restriking Voltage which significantly affects operation of the circuit breaker to interrupt fault current successfully. The paper intends to analyze the Transient Recovery Voltage characteristics across circuit breaker of line with the topology of series compensation. The paper also investigates impact of different factors such as fault type & fault distance on characteristics of Transient Recovery Voltage.","PeriodicalId":342831,"journal":{"name":"2017 2nd IEEE International Conference on Recent Trends in Electronics, Information & Communication Technology (RTEICT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123144356","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Design of fault injection technique for VLSI digital circuits VLSI数字电路故障注入技术设计
B.J Lavanyashree, S. Jamuna
{"title":"Design of fault injection technique for VLSI digital circuits","authors":"B.J Lavanyashree, S. Jamuna","doi":"10.1109/RTEICT.2017.8256869","DOIUrl":"https://doi.org/10.1109/RTEICT.2017.8256869","url":null,"abstract":"Development of VLSI technology has increased the design complexity on the IC chip. With this, the possibility of fault occurrence also has increased. In many of the mission critical applications, the reliability of the system is given a higher priority. In order to make a system reliable, fault tolerant techniques are included in most of the systems. Fault injection is an essential part of the fault tolerant system design. It includes processes of fault insertion and observation of system behaviour in presence of inserted faults. In this paper, an efficient fault injection method is proposed which aims at covering all possible fault occurrences with increased speed of fault injection. This method is applied for s27 circuit and Maximally Redundant signed Digit (MRSD) adder. The proposed technique is implemented using Xilinx 14.5 ISE tool.","PeriodicalId":342831,"journal":{"name":"2017 2nd IEEE International Conference on Recent Trends in Electronics, Information & Communication Technology (RTEICT)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123351256","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Secure data deduplication mechanism based on Rabin CDC and MD5 in cloud computing environment 云计算环境下基于Rabin CDC和MD5的安全重复数据删除机制
Himshai Kambo, Bharati Sinha
{"title":"Secure data deduplication mechanism based on Rabin CDC and MD5 in cloud computing environment","authors":"Himshai Kambo, Bharati Sinha","doi":"10.1109/RTEICT.2017.8256626","DOIUrl":"https://doi.org/10.1109/RTEICT.2017.8256626","url":null,"abstract":"Chunking is a technique that splits a whole file or data into separate chunks. Chunking is applied to detect duplication in any remote processes such as data deduplication and data compression. Content defined chunking is a process of splitting the file into variable length chunks as per the cut points defined initially. Also these are more challenging as byte shifting is involved which results to be expected to increase the deduplication process. While processing out content defined Chunking onto cloud based Dedup App for the encrypted data stored in cloud results in improvement in efficiency. In this paper, we have proposed a technique which includes applying Rabin CDC for purpose of making variable size chunks and further processing that data chunks for encrypted data on cloud. This works on same data being uploaded by different users on same cloud storage (Hadoop Distributed File System).","PeriodicalId":342831,"journal":{"name":"2017 2nd IEEE International Conference on Recent Trends in Electronics, Information & Communication Technology (RTEICT)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123383768","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
An ANN based approach for wireless device fingerprinting 基于神经网络的无线设备指纹识别方法
Kaushal Kumar, A. K. Dalai, Saroj Kumar Panigrahy, S. K. Jena
{"title":"An ANN based approach for wireless device fingerprinting","authors":"Kaushal Kumar, A. K. Dalai, Saroj Kumar Panigrahy, S. K. Jena","doi":"10.1109/RTEICT.2017.8256809","DOIUrl":"https://doi.org/10.1109/RTEICT.2017.8256809","url":null,"abstract":"Device fingerprinting is a technique to characterize or identify a device by using collected information about the device. Wireless device fingerprinting plays an important role in finding counterfeit devices in a wireless network. Fingerprinting methods can be active by sending some information to the target device; or by observing the information sent by the target device which is known as passive fingerprinting. In this paper, a technique of fingerprinting wireless devices based on Artificial Neural Networks has been presented. The parameters used in our work are transmission time and frame inter-arrival time. Our technique classifies unique devices from GTID and Sigcomm2008 datasets using frame inter-arrival time and transmission time and then the results are presented. Using these technique accuracies of 92.3% and 95.8% have been achieved by considering inter-arrival time and transmission time respectively.","PeriodicalId":342831,"journal":{"name":"2017 2nd IEEE International Conference on Recent Trends in Electronics, Information & Communication Technology (RTEICT)","volume":"111 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126428977","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信