2015 Fifth International Conference on Advanced Computing & Communication Technologies最新文献

筛选
英文 中文
Detection of Packet-Dropping Attack in Recoverable Concealed Data Aggregation Protocol for Homogeneous Wireless Sensor Networks 同构无线传感器网络可恢复隐藏数据聚合协议中的丢包攻击检测
A. Kaur, S. Sran
{"title":"Detection of Packet-Dropping Attack in Recoverable Concealed Data Aggregation Protocol for Homogeneous Wireless Sensor Networks","authors":"A. Kaur, S. Sran","doi":"10.1109/ACCT.2015.102","DOIUrl":"https://doi.org/10.1109/ACCT.2015.102","url":null,"abstract":"In wireless sensor networks, communication cost is higher as compared to computational cost, so it is important to minimize the amount of data transmission to extend the network lifetime. To minimize the volume of data to be transmitted, data aggregation is mostly used. As sensor nodes are being deployed in remote and unattented environments, they are prone to node compromise attacks and various other security issues. Hence, it is mandatory that data aggregation protocols must be designed by considering security issues on priority basis. Although, there is a trade-off between data aggregation and security of data, but both aspects are essential. Therefore it is challenging task to maintain data aggregation along with security in these networks. Recoverable Concealed Data aggregation Protocol for Homogeneous wireless sensor networks provides both security as well as aggregation. Despite of its strong security mechanism, this protocol is prone to Packet dropping attacks. This paper aims at detection of packet-dropping attack in Recoverable Concealed Data aggregation Protocol for Homogeneous wireless sensor networks.","PeriodicalId":351783,"journal":{"name":"2015 Fifth International Conference on Advanced Computing & Communication Technologies","volume":"256 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-02-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117005064","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Various Approaches to Minimise Noises in ECG Signal: A Survey 最小化心电信号噪声的各种方法综述
Balwinder Singh, Preeti Singh, S. Budhiraja
{"title":"Various Approaches to Minimise Noises in ECG Signal: A Survey","authors":"Balwinder Singh, Preeti Singh, S. Budhiraja","doi":"10.1109/ACCT.2015.87","DOIUrl":"https://doi.org/10.1109/ACCT.2015.87","url":null,"abstract":"ECG signal is time varying in nature which is most common source used for the diagnosis and analysis of heart diseases present in the patient. ECG is recorded by placing electrodes at specified positions of human body. During recording, ECG is contaminated with artifacts and noises which always degrade its quality, and makes accurate and automatic interpretation more difficult. Power line interference, baseline wanders and muscle tremors are mostly noticed artifacts or noises. So for accurate delineation of characteristics points of ECG, a good quality of ECG is necessary. This paper is presenting a survey on various methods developed for de-noising, delineation of characteristics points and classification of diseases along with their respective advantages and disadvantages.","PeriodicalId":351783,"journal":{"name":"2015 Fifth International Conference on Advanced Computing & Communication Technologies","volume":"81 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-02-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117266538","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 23
The Degrees of Freedom in Wireless Line-of-Sight OAM Multiplexing Systems Using a Circular Array of Receiving Antennas 使用圆形接收天线阵列的无线视距OAM复用系统的自由度
K. A. Opare, Yujun Kuang, J. J. Kponyo, K. Nwizege, Zhang En-zhan
{"title":"The Degrees of Freedom in Wireless Line-of-Sight OAM Multiplexing Systems Using a Circular Array of Receiving Antennas","authors":"K. A. Opare, Yujun Kuang, J. J. Kponyo, K. Nwizege, Zhang En-zhan","doi":"10.1109/ACCT.2015.52","DOIUrl":"https://doi.org/10.1109/ACCT.2015.52","url":null,"abstract":"A wireless multiple-input multiple-output (MIMO) multiplexing system consists of multiple transmit and receive antennas. The channel capacity of such systems does not merely depend on the number of degrees of freedom (DoF) it can support, but also on their gains, represented by the singular values of the channel matrix. A radio frequency based orbital angular momentum (OAM) communication system can be modeled as a MIMO multiplexing system. In the ideal case, message signals transmitted on the same frequency using multiple OAM modes can be separated by using a circular array of receive antennas. In this paper, we characterize circular arrays using three parameters: angular spacing between consecutive antennas, angular span of the elements within the array and the standard deviation of the angular spacing. We show that, the effective degrees of freedom in RF based OAM communication systems depend on the characteristics of the circular array used to receive the transmitted OAM signals.","PeriodicalId":351783,"journal":{"name":"2015 Fifth International Conference on Advanced Computing & Communication Technologies","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-02-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129802550","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 20
An Improved Halftone Visual Secret Sharing Scheme for Gray-Level Images Based on Error Diffusion in Forward and Backward Direction 基于正反向误差扩散的改进灰度图像半色调视觉秘密共享方案
A. Kamboj, D. Gupta
{"title":"An Improved Halftone Visual Secret Sharing Scheme for Gray-Level Images Based on Error Diffusion in Forward and Backward Direction","authors":"A. Kamboj, D. Gupta","doi":"10.1109/ACCT.2015.92","DOIUrl":"https://doi.org/10.1109/ACCT.2015.92","url":null,"abstract":"Visual cryptography is data security technique which allows visual information to be encrypted in such away that their decryption can be performed by human visual system. Visual secret sharing scheme encode a secret image into some shares which separately reveal no knowledge about the secret information. The share are obtained using basic visual (2, 2) scheme. The visible image is first converted into halftones shares using halftone error diffusion method. Then secret image is encoded into halftone shares carrying significant visual information. Shares are distributed to participants and then they are super imposed to reveal the secret. In this paper work, the visual quality of recovered secret images obtained after different error diffusion techniques is analysed with respect to PSNR, NCC, MSE and UQI. On analysis it is found that results of recovered secret image are better when errors are distributed uniformly to each of neighboring pixels in both forward and backward direction in the image.","PeriodicalId":351783,"journal":{"name":"2015 Fifth International Conference on Advanced Computing & Communication Technologies","volume":"596 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-02-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127517496","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Dynamic Pattern Search Algorithm with Zero Motion Prejudgment for Fast Motion Estimation 基于零运动预判的快速运动估计动态模式搜索算法
S. M. Arora, N. Rajpal, R. Purwar
{"title":"Dynamic Pattern Search Algorithm with Zero Motion Prejudgment for Fast Motion Estimation","authors":"S. M. Arora, N. Rajpal, R. Purwar","doi":"10.1109/ACCT.2015.133","DOIUrl":"https://doi.org/10.1109/ACCT.2015.133","url":null,"abstract":"In the development of fast block based motion estimation (BME) algorithms, the focus is always on reduction of computational burden with quality as good as that of Full Search algorithm. Various fixed search BME algorithms like TSS, DS etc. Have been proposed in the literature for fast motion estimation but these suffer from over or under search for slow or fast motion video sequences. For quick determination of motion vector of fast moving blocks large search patterns would be helpful but this may cause unnecessary searches for small motion. Therefore a Dynamic Pattern Search algorithm had been suggested that uses the spatial coherence of the left adjacent block and temporal coherence of the collocated block from the reference frame to adjust the search pattern size. Further it was found that large numbers of blocks especially in slow motion sequences are zero motion blocks. Their early determination enhances the speed of motion estimation. A dynamic zero threshold determination model is implemented in this paper to speed up the motion estimation in Dynamic Pattern Search Algorithm. Simulation results clearly indicates 70-95% speed gain for slow motion sequences.","PeriodicalId":351783,"journal":{"name":"2015 Fifth International Conference on Advanced Computing & Communication Technologies","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-02-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130195406","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Optimization of Topology Update Interval for k-Connected MANETs k-连通manet拓扑更新间隔优化
C. Krishna, S. Agrawal, A. Garg
{"title":"Optimization of Topology Update Interval for k-Connected MANETs","authors":"C. Krishna, S. Agrawal, A. Garg","doi":"10.1109/ACCT.2015.9","DOIUrl":"https://doi.org/10.1109/ACCT.2015.9","url":null,"abstract":"In this paper, we determine optimal topology update interval for fault tolerant k-edge connected topology update algorithm Local Tree-based Reliable Topology (LTRT) used in Mobile Ad-hoc Networks (MANETs). Topology update algorithms are periodically run on each participant node of MANET. This period called topology update interval (Δt), is chosen to be uniform. However, neither a high nor a low value of Δt is suitable for a MANET due to unpredictable moving speed of nodes and connectivity ratio and power consumption restrictions. In this paper a method is proposed to dynamically determine the optimal value of topology update interval for k-edge connected topology control algorithm LTRT used in MANETs. The proposed method automatically determines the appropriate value of Δt while ensuring the required connectivity ratio of the whole network for a given node speed and energy consumption goal. The results show that the dynamic method can enhance the network connectivity, allow higher moving speed and improve the performance of network on the same cost, in terms of transmission range that is directly related to power consumption.","PeriodicalId":351783,"journal":{"name":"2015 Fifth International Conference on Advanced Computing & Communication Technologies","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-02-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125298999","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
BER Assessment of FEC Incorporated OFDM-MPSK Wireless System FEC合并OFDM-MPSK无线系统的误码率评估
Lavish Kansal, Vishal Sharma, Jagjit Singh
{"title":"BER Assessment of FEC Incorporated OFDM-MPSK Wireless System","authors":"Lavish Kansal, Vishal Sharma, Jagjit Singh","doi":"10.1109/ACCT.2015.21","DOIUrl":"https://doi.org/10.1109/ACCT.2015.21","url":null,"abstract":"Due to elevated data rate transmission, fading immunity and bandwidth efficient capability, OFDM comes out as a key technology in contemporary wireless communication systems. Additionally, to access error free transmission, diverse channel codes for instance Convolution Codes (CC), Reed Solomon (RS) and BCH codes are being used in the previous work. In this work, an OFDM based M-PSK wireless system is demonstrated incorporating diverse channel encoding techniques over Rayleigh fading channel. The performance of the simulated test-bed is investigated via BER assessment as a function of SNR. Our simulation results reports a significant improvement in BER of the simulated system using BCH over CC and RS.","PeriodicalId":351783,"journal":{"name":"2015 Fifth International Conference on Advanced Computing & Communication Technologies","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-02-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121040867","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
BER Assessment of MIMO Incorporated W-OFDM Wireless Communication System MIMO组合W-OFDM无线通信系统误码率评估
Vishal Sharma, H. Kaur, Gurpreet Singh
{"title":"BER Assessment of MIMO Incorporated W-OFDM Wireless Communication System","authors":"Vishal Sharma, H. Kaur, Gurpreet Singh","doi":"10.1109/ACCT.2015.94","DOIUrl":"https://doi.org/10.1109/ACCT.2015.94","url":null,"abstract":"Due to elevated demands of high data rates and capacity for wireless systems, Wavelet based OFDM (W-OFDM) comes out as a key solution. W-OFDM is employed using orthogonal wavelets, seeing that orthogonal wavelets enfold additional potential of reducing ISI and ICI effects due to multipath fading environment and offers additional bandwidth efficiency as compare to conventional OFDM (C-OFDM) [1]. Furthermore, to increase capacity range in conjunction with prominent data rate and reliable performance, an approach of MIMO has been acclaimed as a combative technique with the use of multiple antennas. In this paper, BER evaluation of MIMO-W-OFDM for improving bandwidth efficiency by means of various modulation schemes is exhibited. Furthermore, a performance comparison with the conventional MIMO-OFDM incorporated wireless system is demonstrated which reports an improved BER with MIMO-WOFDM.","PeriodicalId":351783,"journal":{"name":"2015 Fifth International Conference on Advanced Computing & Communication Technologies","volume":"9 3","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-02-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113932973","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Efficient Packet Forwarding Approach Using Public Vehicles 利用公共车辆的高效数据包转发方法
S. Tayal, M. Tripathy
{"title":"Efficient Packet Forwarding Approach Using Public Vehicles","authors":"S. Tayal, M. Tripathy","doi":"10.1109/ACCT.2015.125","DOIUrl":"https://doi.org/10.1109/ACCT.2015.125","url":null,"abstract":"Vehicular Adhoc Network (VANET) is wireless communication between vehicle to vehicle and vehicle to roadside infrastructure. Rapid response with tough timing limitations and perfect packet delivery system is very necessary for protocol. Non-DTN, DTN and hybrid Protocols minimizes average end-to-end delays and routing overheads but they behave contrarily in different situations. By using different communication range in proposed protocol for public and private vehicles, packet is delivered to greater distance effectively and by comparing the result on three scenarios with GPRS. Packet delivery ratios and routing overheads in all the three scenarios are better and uniform as compared to existing protocol.","PeriodicalId":351783,"journal":{"name":"2015 Fifth International Conference on Advanced Computing & Communication Technologies","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-02-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123741452","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Application Areas of Web Usage Mining Web使用挖掘的应用领域
Saloni Aggarwal, V. Mangat
{"title":"Application Areas of Web Usage Mining","authors":"Saloni Aggarwal, V. Mangat","doi":"10.1109/ACCT.2015.115","DOIUrl":"https://doi.org/10.1109/ACCT.2015.115","url":null,"abstract":"The ongoing increase in the usage of web has led to accumulation of large amounts of data every second. This has in turn made the research industry to grow and focus towards employing web usage mining for increasing the revenues for businesses, carrying out analysis on browsing behavior of web users, improving website layout and much more. Web usage mining is becoming increasingly popular due to the huge amounts of benefits it offers. The most significant amount of information about the web usage by the users is contained in log files usually called as server log files. The clicks made by the user, the order in which they are made and the time spent on each web page is all contained in these logs and is referred to as click stream data or click path data. An attempt has been made through this paper to provide a holistic view as to what click stream data analysis is, how mining techniques are applied on such data to generate useful information and what kind of applications exploit it to get useful information.","PeriodicalId":351783,"journal":{"name":"2015 Fifth International Conference on Advanced Computing & Communication Technologies","volume":"362 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-02-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122808415","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信