2014 International Conference on Communication and Network Technologies最新文献

筛选
英文 中文
FPGA implementation of fast and area efficient CORDIC algorithm FPGA实现快速高效的CORDIC算法
2014 International Conference on Communication and Network Technologies Pub Date : 2014-12-01 DOI: 10.1109/CNT.2014.7062760
M. Chinnathambi, N. Bharanidharan, S. Rajaram
{"title":"FPGA implementation of fast and area efficient CORDIC algorithm","authors":"M. Chinnathambi, N. Bharanidharan, S. Rajaram","doi":"10.1109/CNT.2014.7062760","DOIUrl":"https://doi.org/10.1109/CNT.2014.7062760","url":null,"abstract":"This paper presents the fast and area efficient CORDIC (Coordinate Rotation DIgital Computer)algorithm for sine and cosine wave generation. The concepts of pipelining and multiplexer based CORDIC algorithm is used todecrease the critical path delay and reducing the area respectively. A six stage CORDIC is implemented by two schemes followed by four methods, unrolled CORDIC and multiplexer based CORDIC with and without pipelining. The pipelining is included in four stages(excluding first and last stage). An 8-bit CORDIC algorithm for generating sine wave and cosine wave is designed, implementedand compared by all four methods on Xilinx Spartan3E (XC3S250E).","PeriodicalId":347883,"journal":{"name":"2014 International Conference on Communication and Network Technologies","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128255653","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 20
Welding defects extraction for radiographic images using C-means segmentation method 基于c均值分割的射线图像焊接缺陷提取
2014 International Conference on Communication and Network Technologies Pub Date : 2014-12-01 DOI: 10.1109/CNT.2014.7062729
M. Sundaram, J. Jose, G. Jaffino
{"title":"Welding defects extraction for radiographic images using C-means segmentation method","authors":"M. Sundaram, J. Jose, G. Jaffino","doi":"10.1109/CNT.2014.7062729","DOIUrl":"https://doi.org/10.1109/CNT.2014.7062729","url":null,"abstract":"In Recent years increasing attention is paid to welding defects monitoring in industries. An automatic system to extract and classify the welding defects in radiographic images is a main challenge in industries, because of the miniature welded region. In this paper an automatic method is proposed to extract the various welding defects in radiographic weld images. In the first stage the input radiographic image is pre-processed to enhance the quality of the image. In the second stage the welding region is extracted by using c-means segmentation method. After segmentation different features of the welded region are calculated and the 3-D contour plots are plotted.","PeriodicalId":347883,"journal":{"name":"2014 International Conference on Communication and Network Technologies","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127358562","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Localization in wireless sensor network based on mobile anchor and chord selection 基于移动锚和弦选择的无线传感器网络定位
2014 International Conference on Communication and Network Technologies Pub Date : 2014-12-01 DOI: 10.1109/CNT.2014.7062738
G. Karthiga, C. Preethi, R. Devi
{"title":"Localization in wireless sensor network based on mobile anchor and chord selection","authors":"G. Karthiga, C. Preethi, R. Devi","doi":"10.1109/CNT.2014.7062738","DOIUrl":"https://doi.org/10.1109/CNT.2014.7062738","url":null,"abstract":"Accurate and low-cost sensor localization is a critical requirement for the deployment of wireless sensor networks in a wide variety of applications. Many applications require the sensor nodes to know their locations with a high degree of precision. Various localization methods based on mobile anchor nodes have been proposed for assisting the sensor nodes to determine their locations. However, none of these methods attempt to optimize the trajectory of the mobile anchor node. Accordingly, this project presents a path planning scheme, which ensures that the trajectory of the mobile anchor node minimizes the localization error and guarantees that all of the sensor nodes can determine their locations. The obstacle-resistant trajectory is also proposed to handle the obstacles in the sensing field. Later this path planning algorithm is adjusted so that it suits most of the effective localization algorithms. The performance of the proposed scheme is to be evaluated through a series of simulations with the ns-2 network simulator.","PeriodicalId":347883,"journal":{"name":"2014 International Conference on Communication and Network Technologies","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134417371","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Multitenant SaaS model of cloud computing: Issues and solutions 云计算的多租户SaaS模型:问题和解决方案
2014 International Conference on Communication and Network Technologies Pub Date : 2014-12-01 DOI: 10.1109/CNT.2014.7062719
M. Saraswathi, T. Bhuvaneswari
{"title":"Multitenant SaaS model of cloud computing: Issues and solutions","authors":"M. Saraswathi, T. Bhuvaneswari","doi":"10.1109/CNT.2014.7062719","DOIUrl":"https://doi.org/10.1109/CNT.2014.7062719","url":null,"abstract":"Today's businesses can attain applications on demand using cloud computing. Multi-tenancy is a significant feature of cloud computing in which a single application is shared among multiple tenants. Multi-tenancy offers variety of advantages including cost savings, resource utilization, version control and more. Currently more applications are moved from organization's internal infrastructure to data centers using shared infrastructure that provide Software as a Service (SaaS) to large number of organizations. This paper is devoted to discussing different options for implementing multitenancy such as An Efficient Schema Shared Approach for Cloud Based Multitenant Database with Authentication & Authorization Framework and A Non-Intrusive Multi-Tenant Database For Large Scale Applications. Finally analyze the two solution with various factors.","PeriodicalId":347883,"journal":{"name":"2014 International Conference on Communication and Network Technologies","volume":"280 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132907706","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Design and development of microstrip trisection filter for DTH applications 应用于下潜点的微带三分滤波器的设计与开发
2014 International Conference on Communication and Network Technologies Pub Date : 2014-12-01 DOI: 10.1109/CNT.2014.7062714
R. Kaushik, M. Ganesh Madhan, K. Jagadeeshvelan
{"title":"Design and development of microstrip trisection filter for DTH applications","authors":"R. Kaushik, M. Ganesh Madhan, K. Jagadeeshvelan","doi":"10.1109/CNT.2014.7062714","DOIUrl":"https://doi.org/10.1109/CNT.2014.7062714","url":null,"abstract":"A Microstrip structure for IF signal filtering for Direct to Home (DTH) application is reported in this paper. The filter design hinges on cascaded cross coupled trisection open loop resonators. The filter is designed and simulated using ADS tool. The filter provides a bandwidth of 240 MHz, with a center frequency of 1.32 GHz. The novelty of this paper lies in its improved Fractional Bandwidth (FBW) and in the context of application of the filter, wherein a simple and compact design is adapted for DTH application. The response of the fabricated filter is found to agree with the simulation.","PeriodicalId":347883,"journal":{"name":"2014 International Conference on Communication and Network Technologies","volume":"5 3","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133042863","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Knowledge extracting system for non-expert miners 面向非专业矿工的知识提取系统
2014 International Conference on Communication and Network Technologies Pub Date : 2014-12-01 DOI: 10.1109/CNT.2014.7062745
P. Ramya, S. Mohanavalli, S. Sasirekha
{"title":"Knowledge extracting system for non-expert miners","authors":"P. Ramya, S. Mohanavalli, S. Sasirekha","doi":"10.1109/CNT.2014.7062745","DOIUrl":"https://doi.org/10.1109/CNT.2014.7062745","url":null,"abstract":"Argo is a global array of 3,000 free-drifting profiling floats that will measure the temperature, pressure and salinity of the upper 2000 m of the ocean. This will allow continuous monitoring of the climate state of the ocean, with all data being relayed and made publicly available within hours after collection. Conceptually, Argo builds on the existing upper-ocean thermal networks, extending their spatial and temporal coverage, depth range and accuracy, and enhancing them through addition of salinity and velocity measurements. Also the float reads its latitude and longitude values. All these information in combination called as dataset and processed with some pre-processing and mining strategies. Pre-processing technique allows to extract the features that are required to define the ocean behaviour. Mining defines the similar patterns present in the dataset. Extracted pattern describes the behaviour of saline water by giving the tsunami alerts and PFZ's.","PeriodicalId":347883,"journal":{"name":"2014 International Conference on Communication and Network Technologies","volume":"15 3","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114035794","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Reversible data hiding by reserving room 通过预留房间隐藏可逆数据
2014 International Conference on Communication and Network Technologies Pub Date : 2014-12-01 DOI: 10.1109/CNT.2014.7062733
S. Arivazhagan, W. Jebarani, C. Karthika
{"title":"Reversible data hiding by reserving room","authors":"S. Arivazhagan, W. Jebarani, C. Karthika","doi":"10.1109/CNT.2014.7062733","DOIUrl":"https://doi.org/10.1109/CNT.2014.7062733","url":null,"abstract":"Reversible data hiding by reserving room becomes more prominent, since the original cover is restored without any loss after the hidden data is extracted. Encryption is performed to provide the confidentiality for the image content. In this project,space for embedding data is reserved with pairwise prediction error expansion(PEE) and histogram shift before encryption has been performed, so that data hider can reversibly embed data into encrypted image easily. Image redundancy isbetter exploited in prediction error expansion which leads to superior performance. But in current PEE based method, correlation within prediction error is not better exploited. Hence to better exploit the correlation among prediction errors, two prediction errors are jointly considered. Then the embedding is based on the prediction error pair and its 2D prediction-error histogram, which leads to improved performance. Secret data extraction and image restoration in this method is free of any errors. By this method, high PSNR is achieved than any other method in reversible data hiding.","PeriodicalId":347883,"journal":{"name":"2014 International Conference on Communication and Network Technologies","volume":"344 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124248889","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Robust real time face detection automatically from video sequence based on Haar features 基于Haar特征的视频序列鲁棒实时人脸自动检测
2014 International Conference on Communication and Network Technologies Pub Date : 2014-12-01 DOI: 10.1109/CNT.2014.7062769
P. Ithaya Rani, K. Muneeswaran
{"title":"Robust real time face detection automatically from video sequence based on Haar features","authors":"P. Ithaya Rani, K. Muneeswaran","doi":"10.1109/CNT.2014.7062769","DOIUrl":"https://doi.org/10.1109/CNT.2014.7062769","url":null,"abstract":"The automatic human face detection from sequences of video plays vital role in intelligent human computer interaction systems for video surveillance, face recognition, emotion recognition and face database management. This paper proposes an automatic and robust method to detect human faces from the background that is capable of processing images rapidly while achieving high detection rates from video sequences. Highlight of the face detection system is to identify and locate all faces regardless of their position, scale, orientation, lighting conditions, expressions etc. The field of work is the incorporation of a normalization technique based on local histograms to alleviate a common problem in conventional face detection methods such as: inconsistent performance due to sensitivity to variation illuminations such as local shadowing, noise and occlusion. Next the Haar-like rectangle features can be computed very rapidly using the integral image that is most suitable for face/non face classification. In the final step, the face region is detected through a cascade of classifier consisting of detectors with Adaboost algorithm. Experimental result is showing promising results by conducting the experiments on video sequence as against the existing work on images.","PeriodicalId":347883,"journal":{"name":"2014 International Conference on Communication and Network Technologies","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127453174","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Implementation of pipelined hardware architecture for AES algorithm using FPGA 用FPGA实现AES算法的流水线硬件架构
2014 International Conference on Communication and Network Technologies Pub Date : 2014-12-01 DOI: 10.1109/CNT.2014.7062766
J. Senthil Kumar, C. Mahalakshmi
{"title":"Implementation of pipelined hardware architecture for AES algorithm using FPGA","authors":"J. Senthil Kumar, C. Mahalakshmi","doi":"10.1109/CNT.2014.7062766","DOIUrl":"https://doi.org/10.1109/CNT.2014.7062766","url":null,"abstract":"The Advanced Encryption Standard is the recent data security standard referred to as Federal Information Processing Standard 197 (FIPS 197) acquired worldwide by several private and public sectors for protective needs of data storage and secure data application from mobile consumer products to high end user. Most of the AES implementation for reconfigurable devices, however based on the configurable logic such as flip-flops and lookup tables. In this paper AES implementation focuas on embedded function inside of Xilinx devices such as large dual ported BRAM and DSP blocks with the goal of minimizing the use of register and lookup tables that those may be used for other functions. The paper presents a hardware implementation of AES algorithm on FPGA. The proposed model of AES algorithm was implemented in FPGA using Virtex 5 kit and Xilinx ISE development suite.","PeriodicalId":347883,"journal":{"name":"2014 International Conference on Communication and Network Technologies","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131316162","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Secured transmission in cooperative groups using Group Key Management Protocol 使用组密钥管理协议在合作组中安全传输
2014 International Conference on Communication and Network Technologies Pub Date : 2014-12-01 DOI: 10.1109/CNT.2014.7062741
L. S. Mutneja, A. P. Bhagat
{"title":"Secured transmission in cooperative groups using Group Key Management Protocol","authors":"L. S. Mutneja, A. P. Bhagat","doi":"10.1109/CNT.2014.7062741","DOIUrl":"https://doi.org/10.1109/CNT.2014.7062741","url":null,"abstract":"The biggest issue in dealing with the remote cooperative group is efficient and secured broadcast. There is unavailability of a fully trusted key generator center. The Secure key distribution implementation GKMP (Group Key Management Protocol) is an efficient solution to all these issues. It creates keys for groups, distributes to the key members, ensures rule based access and allows hierarchical control of group actions. This paper gives an overview of different approaches for secured transmission in cooperative groups. This paper also presents the group key management protocol for secure transmission in cooperative groups.","PeriodicalId":347883,"journal":{"name":"2014 International Conference on Communication and Network Technologies","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131470060","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信