2014 International Conference on Communication and Network Technologies最新文献

筛选
英文 中文
Unsupervised edge enhancement algorithm for SAR images using exploitation of wavelet transform coefficients 基于小波变换系数的SAR图像无监督边缘增强算法
2014 International Conference on Communication and Network Technologies Pub Date : 2014-12-01 DOI: 10.1109/CNT.2014.7062725
M. N. Sumaiya, R. Shantha Selva Kumari
{"title":"Unsupervised edge enhancement algorithm for SAR images using exploitation of wavelet transform coefficients","authors":"M. N. Sumaiya, R. Shantha Selva Kumari","doi":"10.1109/CNT.2014.7062725","DOIUrl":"https://doi.org/10.1109/CNT.2014.7062725","url":null,"abstract":"In this paper, very simple automatic edge enhancement algorithm for Synthetic Aperture Radar (SAR) Image has been presented. Maximum Wavelet coefficients among three subbands at different scales have been exploited to form point wise maxima product. This operation produces enhanced edges in the wavelet domain itself. In many of the research works, development of edge enhancement step has been proposed prior to edge detection step. This enhancement step would ease the automatic edge detection operation. Simulated Images have been used to test the performance of the method and it is extended to the real SAR images also. For objective evaluation, quality metrics like EBCM, CP have been measured as 117 & 40 and shows good performance.","PeriodicalId":347883,"journal":{"name":"2014 International Conference on Communication and Network Technologies","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132018942","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Bio-inspired self-healing routing to improve lifetime of wireless sensor networks 改进无线传感器网络寿命的仿生自愈路由
2014 International Conference on Communication and Network Technologies Pub Date : 2014-12-01 DOI: 10.1109/CNT.2014.7062740
C. B. Lakshmi, S. K. Mohan Rao
{"title":"Bio-inspired self-healing routing to improve lifetime of wireless sensor networks","authors":"C. B. Lakshmi, S. K. Mohan Rao","doi":"10.1109/CNT.2014.7062740","DOIUrl":"https://doi.org/10.1109/CNT.2014.7062740","url":null,"abstract":"Recent advances in Compact and wireless embedded Systems coupled with the technological innovations in Micro Electro Mechanical Systems(MEMS), Wireless Communications and networks paved the way for the development of small, resource constrained devices called Sensor Nodes (SNs). Performance of Sensor Node is highly dependent on the effective and efficient usage of the available limited resources with it, leading to maximum lifetime of Wireless Sensor Network (WSN) which is a primary concern of WSNs. The depletion of a SN energy leads to change in topology of WSNs often over a period of time. Therefore, protocols which consider the dynamic nature of WSNs are crucial for improving the network lifetime. In this paper, we propose bio inspired Ant Colony optimization based Self healing routing scheme inspired by swarm Intelligence technique to improve lifetime of a WSN.","PeriodicalId":347883,"journal":{"name":"2014 International Conference on Communication and Network Technologies","volume":"85 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130972342","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Dental work extraction for different radiographic Images in human Forensic Identification 人类法医鉴定中不同放射图像的牙工作提取
2014 International Conference on Communication and Network Technologies Pub Date : 2014-12-01 DOI: 10.1109/CNT.2014.7062724
G. Jaffino, A. Banumathi, U. Gurunathan, J. Prabin Jose
{"title":"Dental work extraction for different radiographic Images in human Forensic Identification","authors":"G. Jaffino, A. Banumathi, U. Gurunathan, J. Prabin Jose","doi":"10.1109/CNT.2014.7062724","DOIUrl":"https://doi.org/10.1109/CNT.2014.7062724","url":null,"abstract":"Dental biometrics is used to identify the individuals in the forensic domain. Forensic identification is used to identify the person by comparing postmortem and ante mortem dental images. The dental radiograph image provides the information about teeth, tooth contours and in addition to that dental work (DW) is one of the notable issues for forensic identification. This dental work includes crown filling, root canal and crown mineralization for tooth. In this paper addresses the dental work identification for different radiographic images such as bitewing, periapical and panoramic dental images with Mahalanobis distance based matching. The proposed system contains preprocessing, feature extraction and matching. Experimental evaluation gives the satisfied results which will abet for dental biometrics.","PeriodicalId":347883,"journal":{"name":"2014 International Conference on Communication and Network Technologies","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125841217","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Variants of RSA and their cryptanalysis RSA的变体及其密码分析
2014 International Conference on Communication and Network Technologies Pub Date : 2014-12-01 DOI: 10.1109/CNT.2014.7062742
K. Balasubramanian
{"title":"Variants of RSA and their cryptanalysis","authors":"K. Balasubramanian","doi":"10.1109/CNT.2014.7062742","DOIUrl":"https://doi.org/10.1109/CNT.2014.7062742","url":null,"abstract":"In this paper, I present some of the variants of RSA and analyse the cryptanalytic attacks against these variants. The first variant I present is called the Efficient RSA, where the number of key generation exponents is increased compared to the original RSA. Another variant of RSA I present is called the Dependent RSA which is aimed at providing Semantic Security to the original RSA. A third variant of RSA which I call Carmichael RSA uses the Carmichael function instead of the Euler Phi Function. The other variants that discussed are the Shared RSA, the Multiprime RSA, the Common Prime RSA the CRT-RSA and the Rebalanced CRT-RSA. I discuss the cryptanalysis of these RSA systems along with the implementation aspects of the variants of the RSA Cryptosystem.","PeriodicalId":347883,"journal":{"name":"2014 International Conference on Communication and Network Technologies","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125841660","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Capacity based resource allocation in cloud 云计算中基于容量的资源分配
2014 International Conference on Communication and Network Technologies Pub Date : 2014-12-01 DOI: 10.1109/CNT.2014.7062718
K. Vimala Devi, S. Vetha
{"title":"Capacity based resource allocation in cloud","authors":"K. Vimala Devi, S. Vetha","doi":"10.1109/CNT.2014.7062718","DOIUrl":"https://doi.org/10.1109/CNT.2014.7062718","url":null,"abstract":"Cloud computing is a new technology in computer field which provides various resources over the Internet. It serves different types of the resources in virtualized form. Resource allocation and better utilization of the virtualized resources can be done by using scheduling. This paper analyses various types of scheduling algorithms for resource allocation in cloud computing. We propose a new algorithm to allocate resources in efficient manner. The developed resource allocation algorithm is based on different parameters like number of processor requests, capacity requests etc. Our proposal algorithm can be used for a better resource allocation of jobs in the cloud environment.","PeriodicalId":347883,"journal":{"name":"2014 International Conference on Communication and Network Technologies","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124976152","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Investigation on Specific Absorption Rate due to electromagnetic radiation 电磁辐射比吸收率的研究
2014 International Conference on Communication and Network Technologies Pub Date : 2014-12-01 DOI: 10.1109/CNT.2014.7062774
B. Anoob, C. Unni
{"title":"Investigation on Specific Absorption Rate due to electromagnetic radiation","authors":"B. Anoob, C. Unni","doi":"10.1109/CNT.2014.7062774","DOIUrl":"https://doi.org/10.1109/CNT.2014.7062774","url":null,"abstract":"This paper presents the design of a planar printed antenna with ground plate is in coplanar configuration. The target of this paper is to introduce an antenna that supports all mobile and wireless services with low SAR value. The antenna operates for most of the mobile applications such as the GSM 850, GSM 900, DCS 1800, PCS 1900, and UMTS 2100. The antenna also support WiMAX, wireless local area network (WLAN), and the Industrial, Scientific, and Medical (ISM) bands. The proposed antenna consists of monopole, meander line, and a spiral EBG structure. Higher frequency bands are supported by both the meander line and the monopole since they acts as traveling-wave antennas at the high frequency bands. The high impedance surface property of the EBG structure is utilized here to reduce the radiation at the resonant frequency of the mobile band. The proposed antenna exhibits certain features such compact size, the multiband operation including the low frequency bands, and the low SAR radiation. The simulations were carried out in CST Microwave studio.","PeriodicalId":347883,"journal":{"name":"2014 International Conference on Communication and Network Technologies","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115799846","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Design of router using Reversible Logic in Quantum Cellular Automata 量子元胞自动机中基于可逆逻辑的路由器设计
2014 International Conference on Communication and Network Technologies Pub Date : 2014-12-01 DOI: 10.1109/CNT.2014.7062764
A. Kamaraj, Abinaya, S. Ramya
{"title":"Design of router using Reversible Logic in Quantum Cellular Automata","authors":"A. Kamaraj, Abinaya, S. Ramya","doi":"10.1109/CNT.2014.7062764","DOIUrl":"https://doi.org/10.1109/CNT.2014.7062764","url":null,"abstract":"Quantum Cellular Automata (QCA) is a promising future to the CMOS technology with ultra operating speed and low power consumption. The realization of QCA with Reversible Logic is the Green Computing. A router is the key component in the internet core for transmitting data packets. Being the technology beyond CMOS, the work has been proposed to design a Router in QCA. In addition to that, crossing in Router architecture is done in Multilayer with reversible logic. This proposed architecture guarantees efficient data routing in Router. Also it provides reduced cell area, high operating speed, and minimum complexity.","PeriodicalId":347883,"journal":{"name":"2014 International Conference on Communication and Network Technologies","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126573808","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Comparative analysis of random based mobility models using TCP variant in MANETs 基于随机的移动模型在移动网络中TCP变体的比较分析
2014 International Conference on Communication and Network Technologies Pub Date : 2014-12-01 DOI: 10.1109/CNT.2014.7062778
S. Devaraj, R. Helen, Vedanayagi Anita, J. Christa
{"title":"Comparative analysis of random based mobility models using TCP variant in MANETs","authors":"S. Devaraj, R. Helen, Vedanayagi Anita, J. Christa","doi":"10.1109/CNT.2014.7062778","DOIUrl":"https://doi.org/10.1109/CNT.2014.7062778","url":null,"abstract":"In Mobile Ad-hoc Networks (MANETs), mobile node act as router themselves and keeping the route information to reach other mobile nodes and helps to forward data packets from one mobile to another mobile node. The performance of the different mobility models such as Random Walk (RW), Random Waypoint (RWP), Manhattan Mobility (MM), Reference Point Group Mobility (RPGM) are widely analyzed in the environment using NS2.34 software under Linux platform (Fedora). Depending on the type of TCP (Transmission Control Protocol) implementation the behavior was different for each mobility models and it's due to the activation or missing of the following algorithms Slow Start, Congestion Avoidance and Congestion Detection. The performance of TCP flows in an Mobile ad-hoc network is analyzed using four different mobility models with Ad hoc On- Demand Distance Vector (AODV) as the routing protocol and TCP/TCP New Reno as the transport protocol.","PeriodicalId":347883,"journal":{"name":"2014 International Conference on Communication and Network Technologies","volume":"23 22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128433000","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
A review on beamforming techniques for cognitive multi-antenna relay network 认知多天线中继网络波束形成技术综述
2014 International Conference on Communication and Network Technologies Pub Date : 2014-12-01 DOI: 10.1109/CNT.2014.7062723
G. Prema, R. Karthiyayini
{"title":"A review on beamforming techniques for cognitive multi-antenna relay network","authors":"G. Prema, R. Karthiyayini","doi":"10.1109/CNT.2014.7062723","DOIUrl":"https://doi.org/10.1109/CNT.2014.7062723","url":null,"abstract":"Cognitive radio is widely expected to be the next Big Bang in wireless communications. Spectrum is a scarce resource and it used efficiently by incorporating beamforming in the multi-antenna relay for cognitive networks. In this paper, both the adaptive beamforming for the relay networks and the performance estimation at the secondary user receiver in cognitive networks were discussed. Special attention is given to the system capacity of the cognitive networks at the secondary user receiver.","PeriodicalId":347883,"journal":{"name":"2014 International Conference on Communication and Network Technologies","volume":"134 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126862634","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Independent knowledge extraction in nature of humorous text analysis review using online text analysis tool 利用在线文本分析工具对自然幽默文本进行自主知识提取分析复习
2014 International Conference on Communication and Network Technologies Pub Date : 2014-12-01 DOI: 10.1109/CNT.2014.7062746
J. Emmanual Robin, N. Krishnamoorthy, M. Karthikeyan, A. J. Felix
{"title":"Independent knowledge extraction in nature of humorous text analysis review using online text analysis tool","authors":"J. Emmanual Robin, N. Krishnamoorthy, M. Karthikeyan, A. J. Felix","doi":"10.1109/CNT.2014.7062746","DOIUrl":"https://doi.org/10.1109/CNT.2014.7062746","url":null,"abstract":"The purpose of Text Mining is to process unstructured (textual) information, extracting meaningful numeric indices from the text, and, thus, make the information contained in the text accessible to the various data mining (statistical and machine learning) algorithms. Information can be extracted to derive summaries for the words contained in the documents or to compute summaries for the documents based on the words contained in them. Hence, we can analyze words, clusters of words used in documents, etc., or we can analyze documents and determine similarities between them or how they are related to other variables of interest in the data mining project. This topic that might be integrated with massive files of very disparate joke clusters, bound only because someone thought that they were funny or someone had an interesting thing for light-bulb jokes. Therefore, there are probably tons of doubles and triples and what you have in this collection, and there's just not enough time in the day to sort them, manually. This paper is going to analyze the different variation and analysis of funny or humorous words using data mining techniques.","PeriodicalId":347883,"journal":{"name":"2014 International Conference on Communication and Network Technologies","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131570563","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信