2015 Fifth International Conference on Advanced Computing & Communication Technologies最新文献

筛选
英文 中文
Modified Max-Min Algorithm for Game Theory 改进的博弈论最大最小算法
V. Ranga, M. Dave, A. Verma
{"title":"Modified Max-Min Algorithm for Game Theory","authors":"V. Ranga, M. Dave, A. Verma","doi":"10.1109/ACCT.2015.18","DOIUrl":"https://doi.org/10.1109/ACCT.2015.18","url":null,"abstract":"The recent advancements in the game theory have led to it being applied in various applications such as communication, networks, business, biology, political system etc. Precisely, Max-Min Algorithm is a decision based rule used in the game theory for deciding the next step of a player out of a set of possible steps. It can be thought of maximizing the minimum profit of the player. The assumption made in the current literature of zero-sum game theory is that both players are rational and logical to decide the best possible step out of the available options. On the Prima Facie, we expect a player to choose the best possible step for himself/herself. But in doing so, he/she might give away his/her move to his/her rival, who, being a rational thinker, can manipulate the game to take his/her advantage or alternatively rival's loss. Our proposed approach seeks to overcome this loophole presented in the current Max-Min approach by construction of a function which solves the trade-off between predictability and maximum profit. The key idea here is to select a step with a potential to earn high profit and being unpredictable in picking up that step at the same moment, thus making it nearly impossible for the adversary to predict the next step. In the nut shell, our work is an attempt to reduce the worst case complexity of original Max-Min approach.","PeriodicalId":351783,"journal":{"name":"2015 Fifth International Conference on Advanced Computing & Communication Technologies","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-02-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115678374","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
High Density Noise Removal by Using Cascading Algorithms 基于级联算法的高密度噪声去除
Arabinda Dash, Sujaya Kumar Sathua
{"title":"High Density Noise Removal by Using Cascading Algorithms","authors":"Arabinda Dash, Sujaya Kumar Sathua","doi":"10.1109/ACCT.2015.100","DOIUrl":"https://doi.org/10.1109/ACCT.2015.100","url":null,"abstract":"An advanced non-linear cascading filter algorithm for the removal of high density salt and pepper noise from the digital images is proposed. The proposed method consists of two stages. The first stage Decision base Median Filter (DMF) acts as the preliminary noise removal algorithm. The second stage is either Modified Decision Base Partial Trimmed Global Mean Filter (MDBPTGMF) or Modified Decision Based Unsymmetric Trimmed Median Filter (MDBUTMF) which is used to remove the remaining noise and enhance the image quality. The DMF algorithm performs well at low noise density but it fails to remove the noise at medium and high level. The MDBPTGMF and MDUTMF have excellent performance at low, medium and high noise density but these reduce the image quality and blur the image at high noise level. So the basic idea behind this paper is to combine the advantages of the filters used in both the stages to remove the Salt and Pepper noise and enhance the image quality at all the noise density level. The proposed method is tested against different gray scale images and it gives better Mean Absolute Error (MAE), Peak Signal to Noise Ratio (PSNR) and Image Enhancement Factor (IEF) than the Adaptive Median Filter (AMF), Decision Base Unsymmetric Trimmed Median Filter (DBUTMF), Modified Decision Base Unsymmetric Trimmed Median Filter (MDBUTMF) and Decision Base Partial Trimmed Global Mean Filter (DBPTGMF).","PeriodicalId":351783,"journal":{"name":"2015 Fifth International Conference on Advanced Computing & Communication Technologies","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-02-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124948695","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 28
Secure-SPIN with Cluster for Data Centric Wireless Sensor Networks Secure-SPIN与集群的数据中心无线传感器网络
Ashutosh Tripathi, N. Yadav, R. Dadhich
{"title":"Secure-SPIN with Cluster for Data Centric Wireless Sensor Networks","authors":"Ashutosh Tripathi, N. Yadav, R. Dadhich","doi":"10.1109/ACCT.2015.26","DOIUrl":"https://doi.org/10.1109/ACCT.2015.26","url":null,"abstract":"Routing Algorithms are driving the growth of the data transmission in wireless sensor network. Contextually, many algorithms proposed for efficient data transferring. This paper uses the scenario and node distribution across the Battle field in India. This Paper uses clustering algorithms to send the data over different geographic region. During the Battle, data gathering and data aggregation to base station is important and critical task. Based on event, clustering algorithm used. This paper assumes that sensor node uniformly distributed and coordinates of the base station and nodes are known. This paper is essential to enable the cluster head based selection scheme used in battle field and the performance of proposed protocol compute intensive and can significantly benefit over the others scheme. Proposed scheme having better data gathering, stability period and lifetime than the LECH scheme. The proposed scheme is implemented and simulated with LEACH in NS2.34. Simulation shows proposed protocol performance gains is better over the LEACH for lifetime of network and guaranteed data transmission.","PeriodicalId":351783,"journal":{"name":"2015 Fifth International Conference on Advanced Computing & Communication Technologies","volume":"101 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-02-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123194983","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Design of Low Leakage Current Average Power CMOS Current Comparator Using SVL Technique 基于SVL技术的低漏电流平均功率CMOS电流比较器设计
Sakshi Saxena, S. Akashe
{"title":"Design of Low Leakage Current Average Power CMOS Current Comparator Using SVL Technique","authors":"Sakshi Saxena, S. Akashe","doi":"10.1109/ACCT.2015.95","DOIUrl":"https://doi.org/10.1109/ACCT.2015.95","url":null,"abstract":"This paper presents a low voltage, low leakage complementary metal oxide semiconductor current comparator using self-controlled voltage level technique. The self-controlled voltage level technique presents the integrated realization of an alternative method that is less intricate to implement. With the advancement in semiconductor technology, chip density and operating frequency are increasing, so the power consumption in VLSI circuit has become a major problem of consideration. This paper presented a complementary metal oxide circuit using self-controlled voltage level technique. A self-controllable voltage level (SVL) technique is mainly used to reduce leakage. In this technique when the supply voltage given 0.7V, input current given 1mA then power dissipates 165.6μW. By applying SVL technique on the circuit we measured the leakage power 1.233μW and leakage current 219.2pA then leakage current reduces 89% and leakage power reduces 35% than the traditional comparator. The technique based comparator fabricated on cadence virtuoso tool in 45nm technique. By Using this technology voltage and leakage reduces. The simulation & analytical results show that proposed circuit is correct.","PeriodicalId":351783,"journal":{"name":"2015 Fifth International Conference on Advanced Computing & Communication Technologies","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-02-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125347747","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A Review on the Strategies and Techniques of Image Segmentation 图像分割策略与技术综述
Akanksha Bali, Shailendra Narayan Singh
{"title":"A Review on the Strategies and Techniques of Image Segmentation","authors":"Akanksha Bali, Shailendra Narayan Singh","doi":"10.1109/ACCT.2015.63","DOIUrl":"https://doi.org/10.1109/ACCT.2015.63","url":null,"abstract":"Segmentation is a method of partitioning an image or picture into different regions which has same attributes like Texture, intensity, gray level etc with the motive to yield object of interest from the background. It is a method in which we included the object belongs to the same category in one class and the objects that belong to other category are added in other class for separating the object and background. There are several image segmentation techniques namely traditional thresholding (Otsu) and clustering segmentation (K-means). By differentiating all these image segmentation techniques we have to find which segmentation technique is better on the characteristics of image segmented. Segmentation is done on built in environment which becomes more demanding. In built in environment, both K-means and Otsu are unsuccessful to yield good standard of segmentation because of varying lightening on the image and complex surrounding.","PeriodicalId":351783,"journal":{"name":"2015 Fifth International Conference on Advanced Computing & Communication Technologies","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-02-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125410475","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 68
Extension of Context Free Grammar for Intermediate Code and Peephole Optimization Rule Parsers 中间代码和窥视孔优化规则解析器中上下文无关语法的扩展
Chirag Bhatt, H. Bhadka
{"title":"Extension of Context Free Grammar for Intermediate Code and Peephole Optimization Rule Parsers","authors":"Chirag Bhatt, H. Bhadka","doi":"10.1109/ACCT.2015.79","DOIUrl":"https://doi.org/10.1109/ACCT.2015.79","url":null,"abstract":"For the purpose of writing and constructing compilers, interpreters and optimizers the parsing of code is mandatory. The syntactic analysis of the input intermediate code into its component parts is known as parsing. And for the implementation of such parsers we need a Context Free Grammar (CFG) which helps to analyses the input code. This paper mainly focuses on extension of the CFG in an EBNF form which describes the parser for intermediate code and different peephole optimization rules. The peephole optimizer basically applies some strategies to perform optimization on the intermediate code based on optimization rules but for that it requires parsers which help to determine the intermediate code and optimization rules accordingly.","PeriodicalId":351783,"journal":{"name":"2015 Fifth International Conference on Advanced Computing & Communication Technologies","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-02-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126617855","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Power Optimization of Communication System Using Clock Gating Technique 基于时钟门控技术的通信系统功率优化
Kanika Sahni, K. Rawat, S. Pandey, Ziauddin Ahmad
{"title":"Power Optimization of Communication System Using Clock Gating Technique","authors":"Kanika Sahni, K. Rawat, S. Pandey, Ziauddin Ahmad","doi":"10.1109/ACCT.2015.74","DOIUrl":"https://doi.org/10.1109/ACCT.2015.74","url":null,"abstract":"A power optimized communication system is proposed in this paper with clock gating technique. The encoder decoder block and the converter circuits are designed using clock gating for power optimization without degrading the system performance. Unwanted switching activities can be much reduced by using clock gating techniques and power saving can be done. Negative latch has been used to generate the gated clock which feeds into various blocks. The RTL view of the communication system with gated clock is also generated for implementation in hardware. We have used two clocks of frequencies 20MHz and 200MHz. For these frequencies, the hierarchy total power is reduced by 68.27%, the logic power is reduced by 53.33%, the signal power is reduced by 75.67% and the clock domain and on-chip powers are same as it is in the system without using gated clock. Verilog HDL has been used to implement the various blocks and simulation done using ModelSim 10.3c. RTL implementation has been done using Xilinx ISE suite 13.4.","PeriodicalId":351783,"journal":{"name":"2015 Fifth International Conference on Advanced Computing & Communication Technologies","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-02-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126716676","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Countermeasure for Reinforcement Swap Attack against Directed Diffusion in Wireless Sensor Networks 针对无线传感器网络定向扩散的强化交换攻击对策
Saloni, S. Sran, L. Kaur
{"title":"Countermeasure for Reinforcement Swap Attack against Directed Diffusion in Wireless Sensor Networks","authors":"Saloni, S. Sran, L. Kaur","doi":"10.1109/ACCT.2015.106","DOIUrl":"https://doi.org/10.1109/ACCT.2015.106","url":null,"abstract":"Directed Diffusion is a data centric protocol that focuses on the energy efficiency of the networks. It is interest based routing protocol in which communication occur hop-to-hop rather than end-to-end in wireless sensor networks. Hop-to-hop communication provides link diversity which helps to overcome obstacles like failure of intermediate node on communication path. Directed Diffusion protocol suffers from many attacks like suppression, cloning, path influence, selective forwarding and data tempering which degrades the performance of the network. In addition to this, reinforcement swap attack is being introduced under the path influence attack, which excludes the good route and includes the bad route in reinforcement path for routing. This attacker behavior activated/deactivated periodically to prolong the time of attack and affect the performance of network. Reinforcement swap attack is being performed by attacker in two modes: Norm mode and Halt mode. In norm mode, the attacker node alternates between behaving bad and good in the on/off cycles respectively. In halt mode the attacker fluctuates either behaves bad or put itself in sleep mode to hide its own presence in the on/off cycles. In this paper, countermeasure is being proposed for the said attack in both modes of attack. This mechanism detects malicious node on the basis of various performance metrics. In network, senor node which has the lowest value of performance metrics is considered to be malicious and kept at dead state. During the attack, the sensor nodes which have been included in the routing path by the attacker node are being placed at sleep mode.","PeriodicalId":351783,"journal":{"name":"2015 Fifth International Conference on Advanced Computing & Communication Technologies","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-02-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116062463","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Revisiting TCP Outcast Problem Using DCTCP in Data Center Networks 在数据中心网络中使用DCTCP重新审视TCP丢弃问题
Ankit Patidar, M. Tahiliani
{"title":"Revisiting TCP Outcast Problem Using DCTCP in Data Center Networks","authors":"Ankit Patidar, M. Tahiliani","doi":"10.1109/ACCT.2015.126","DOIUrl":"https://doi.org/10.1109/ACCT.2015.126","url":null,"abstract":"Data Center Networks (DCNs) today are used to compute and store the data of multiple users because of low cost, flexibility and availability. In this multi-tenant cloud environment, resources are shared among different users. Suppose two users fetch data at same time from the same DCNs, one fetches small amount of data (like web search) while another user fetches larger amount of data (like software update). If these large set of flows and small set of flows arrive at two different input ports of a switch and compete for same output port, then large flow packets get the buffer while small flow packets are dropped consecutively. This issue occurs due to drop tail implementation of queue in switches and as one set of flows is outcast by other, the problem is known as TCP Outcast. While a few studies have already explored the TCP Outcast problem, this paper aims to revisit this problem by using DCTCP in DCNs. The experiments carried out using Mininet show that DCTCP solves the problem of TCP Outcast by ensuring fairness for all types of flows.","PeriodicalId":351783,"journal":{"name":"2015 Fifth International Conference on Advanced Computing & Communication Technologies","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-02-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122655309","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Performance Evaluation of Zig-Bee 802.15.4 WPAN Designed in Satellite Subnet Using Opnet Modeler 基于Opnet Modeler的卫星子网zigbee 802.15.4无线广域网性能评价
Bhumika, Mukesh Kumar
{"title":"Performance Evaluation of Zig-Bee 802.15.4 WPAN Designed in Satellite Subnet Using Opnet Modeler","authors":"Bhumika, Mukesh Kumar","doi":"10.1109/ACCT.2015.128","DOIUrl":"https://doi.org/10.1109/ACCT.2015.128","url":null,"abstract":"In this advanced generation of science and technologies, nothing seems to be impossible. The new emerging technologies have made every dream possible. This paper deals with Zig-Bee wireless technique. The Zig-Bee wireless personal area networks (WPANs) are ad-hoc low power networks that are basically applicable in short range distance in low cost. These networks are made up of several to large number of devices/nodes which include a coordinator, routers and end devices. The efficiency of these networks is based on the routing protocol implemented. The purpose of this work is to study the network performance created in satellite subnet in Opnet modeler 14.5. In satellite subnet, the network communicates with the satellite. The global network parameters which are evaluated for the performance of the network are Throughput, Traffic Data Sent, Traffic Received and Load.","PeriodicalId":351783,"journal":{"name":"2015 Fifth International Conference on Advanced Computing & Communication Technologies","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-02-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128581501","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信