2015 Fifth International Conference on Advanced Computing & Communication Technologies最新文献

筛选
英文 中文
RSSI Based Localization Scheme in Wireless Sensor Networks: A Survey 基于RSSI的无线传感器网络定位方案综述
Hetal P. Mistry, N. Mistry
{"title":"RSSI Based Localization Scheme in Wireless Sensor Networks: A Survey","authors":"Hetal P. Mistry, N. Mistry","doi":"10.1109/ACCT.2015.105","DOIUrl":"https://doi.org/10.1109/ACCT.2015.105","url":null,"abstract":"Wireless Sensor Networks (WSNs) are most growing research area because of its low cost, infrastructure less, increase capabilities of nodes, real time and accurate. Localization is a major issue in the wireless sensor networks because it has a number of sensor nodes which are deployed at positions and they may not be fixed at their own position. In localization different techniques are used for distance and position estimation. In this paper we will focus on RSSI based localization in WSN which will show how to reduce location errors and improve accuracy by using various models and techniques. After that we will focus on how to make an algorithm scalable and improve the energy efficiency by providing authentication and key management.","PeriodicalId":351783,"journal":{"name":"2015 Fifth International Conference on Advanced Computing & Communication Technologies","volume":"68 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-02-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128688379","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 81
Solution to Reduce Voice Interruption Time during Handover of VoLTE Call in Enhanced Single Radio Voice Call Continuity 在增强单无线电语音通话连续性中减少VoLTE通话切换时语音中断时间的解决方案
S. Gautam, D. Sharma
{"title":"Solution to Reduce Voice Interruption Time during Handover of VoLTE Call in Enhanced Single Radio Voice Call Continuity","authors":"S. Gautam, D. Sharma","doi":"10.1109/ACCT.2015.97","DOIUrl":"https://doi.org/10.1109/ACCT.2015.97","url":null,"abstract":"LTE network is a packet switched based network, which does not support circuit switched network feature like voice call. Operators have been trying to deploy LTE network in phases and in parallel they are supporting legacy networks too. It is necessary to support voice call. There are many approaches for supporting voice call to serve customer. Circuit Switched Fall Back (CSFB), Simultaneous Voice & LTE (SV-LTE), Over The Top solution (OTT), Voice over LTE via Generic Access (VoLGA) and IMS based Voice over LTE (VoLTE). SRVCC is a voice call handover process for an LTE user, while it is in active IMS based voice session. In case of SRVCC, control is performed by the home network which causes voice interruption & call drops. To overcome these issues ATCF and ATGW entities have been introduced. This paper explains about the issues, causes and solution in SRVCC.","PeriodicalId":351783,"journal":{"name":"2015 Fifth International Conference on Advanced Computing & Communication Technologies","volume":"82 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-02-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125933195","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Performance Analysis of Four Layer Clustering Network Using Enhanced Deterministic Energy-Efficient Clustering Protocol in Wireless Sensor Network 无线传感器网络中基于增强确定性节能聚类协议的四层聚类网络性能分析
S. Soni, Gagandeep Kaur
{"title":"Performance Analysis of Four Layer Clustering Network Using Enhanced Deterministic Energy-Efficient Clustering Protocol in Wireless Sensor Network","authors":"S. Soni, Gagandeep Kaur","doi":"10.1109/ACCT.2015.120","DOIUrl":"https://doi.org/10.1109/ACCT.2015.120","url":null,"abstract":"A wireless network consists of geographically distributed sovereign devices and uses sensors for cooperative monitoring physical conditions. It comprises number of small, and relatively inexpensive and low-power sensors that are connected to the wireless network, constituting a wireless sensor networks (WSNs). They had a wide range of applications e.g. In physiological monitoring, environmental applications, military applications and home security etc. We have developed a purely deterministic model using a Enhanced Deterministic Energy-efficient Clustering Protocol (EDEC) by clustering nodes to organize the WSN. The EDEC is dynamic, distributive, self-organized and more energy efficient than the existing protocols. Simulation results showed a better performance with respect to energy consumption, which is reflected in the network lifetime under both homogeneous and heterogeneous settings, when compared with the existing protocols. The approach estimates an optimal solution for the balanced energy consumptions in ordered wireless sensor networks.","PeriodicalId":351783,"journal":{"name":"2015 Fifth International Conference on Advanced Computing & Communication Technologies","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-02-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126746094","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Survey on Association Rule Mining 关联规则挖掘研究综述
Surbhi K. Solanki, Jalpa Patel
{"title":"A Survey on Association Rule Mining","authors":"Surbhi K. Solanki, Jalpa Patel","doi":"10.1109/ACCT.2015.69","DOIUrl":"https://doi.org/10.1109/ACCT.2015.69","url":null,"abstract":"Task of extracting useful and interesting knowledge from large data is called data mining. It has many aspects like clustering, classification, association mining, outlier detection, regression etc. Among them association rule mining is one of the important aspect for data mining. Best example of association rule mining is market-basket analysis. Applications of association rule mining are stock analysis, web log mining, medical diagnosis, customer market analysis bioinformatics etc. In past, many algorithms were developed by researchers for Boolean and Fuzzy association rule mining such as Apriori, FP-tree, Fuzzy FP-tree etc. We are discussing them in detail in later section of this paper.","PeriodicalId":351783,"journal":{"name":"2015 Fifth International Conference on Advanced Computing & Communication Technologies","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-02-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128872992","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 76
Effect of Imperfect Spectrum Sensing on the Protection of Primary User and Performance of Multi-users Environment 不完全频谱感知对主用户保护和多用户环境性能的影响
Indu, Rishipal Singh, Priyanka
{"title":"Effect of Imperfect Spectrum Sensing on the Protection of Primary User and Performance of Multi-users Environment","authors":"Indu, Rishipal Singh, Priyanka","doi":"10.1109/ACCT.2015.41","DOIUrl":"https://doi.org/10.1109/ACCT.2015.41","url":null,"abstract":"To fully utilize the spectrum resources, dynamic spectrum access is found to be very helpful. In this paper, a continuous time Markov chain (CTMC) based dynamic spectrum access (DSA) scheme is proposed for interaction between primary and secondary users along with the imperfect sensing environment (false alarm and misdetection). Since, collision occurs between primary and secondary users because of imperfect sensing, we derived access probability of secondary users so that primary user's protection is ensured. Performance is simulated by varying throughput under proportional factor (PF) criterion and maximal-throughput criterion using MATLAB. Under PF criterion throughput is better but decreases sharply with increase in no. Of users.","PeriodicalId":351783,"journal":{"name":"2015 Fifth International Conference on Advanced Computing & Communication Technologies","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-02-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123009103","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Analysis of the Overhead and Energy Consumption in Flooding, Random Walk and Gossip Based Resource Discovery Protocols in MP2P Networks MP2P网络中基于泛洪、随机漫步和八卦的资源发现协议的开销和能耗分析
A. Arunachalam, O. Sornil
{"title":"An Analysis of the Overhead and Energy Consumption in Flooding, Random Walk and Gossip Based Resource Discovery Protocols in MP2P Networks","authors":"A. Arunachalam, O. Sornil","doi":"10.1109/ACCT.2015.134","DOIUrl":"https://doi.org/10.1109/ACCT.2015.134","url":null,"abstract":"All major mobile communication architectures are mainly centralized. When the mobile devices are switched on it will search for nearby base station or access point. The content being searched is mostly stored in a centralized directory manner. Peer-to-Peer platform can be one of the best possibilities to overcome the restrictions and resolve issues incurred due to centralization. Mobile environment poses additional challenges on such P2P networks - due to limited resources, dynamic and wireless network characteristics, heterogeneity of nodes, limitations on processing power and wireless bandwidth. Hence resource discovery becomes further challenging. Even today mostly the traditional methods like flooding, random walk or gossip based forwarding methods have to be considered along with major limitations and drawbacks. Further in Mobile Peer-to-Peer (MP2P) system the energy aspect is very crucial with regards to the participation of nodes in the system. The search failure rate may increase if a mobile device uses all its energy and hence not participate in the resource discovery process. In this paper, we simulate the existing standard flooding, random walk and gossip based resource discovery algorithms on a P2P Mobile Adhoc Network (MANET) and studied their performance under such highly dynamic mobile network scenario. The efficiency of the resource discovery protocols are validated through extensiveNS-2 simulations.","PeriodicalId":351783,"journal":{"name":"2015 Fifth International Conference on Advanced Computing & Communication Technologies","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-02-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130957174","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Steganography in Image Segments Using Genetic Algorithm 基于遗传算法的图像分段隐写
M. Nosrati, A. Hanani, Ronak Karimi
{"title":"Steganography in Image Segments Using Genetic Algorithm","authors":"M. Nosrati, A. Hanani, Ronak Karimi","doi":"10.1109/ACCT.2015.57","DOIUrl":"https://doi.org/10.1109/ACCT.2015.57","url":null,"abstract":"This study offers a heuristic genetic algorithm based method for message hiding in a carrier image. This approach focuses on the \"before embedding hiding techniques\" by trying to find appropriate places in carrier image to embed the message with the least changes of bits. Due to it, segmentation is done in order to convert the LSBs and message strings to the sets of blocks for participation in genetic algorithm. After finding the right places, secret message blocks are embedded and a key file is created to make the message extraction available by providing the data addresses. Experimental results with the least changes in image histogram (by the policy of setting an appropriate amount for the length of block bits) show the efficiency of current method.","PeriodicalId":351783,"journal":{"name":"2015 Fifth International Conference on Advanced Computing & Communication Technologies","volume":"306 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-02-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116530339","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 36
Machine Learning in Bioinformatics: A Novel Approach for DNA Sequencing 生物信息学中的机器学习:DNA测序的新方法
Pooja Dixit, Ghanshyam I. Prajapati
{"title":"Machine Learning in Bioinformatics: A Novel Approach for DNA Sequencing","authors":"Pooja Dixit, Ghanshyam I. Prajapati","doi":"10.1109/ACCT.2015.73","DOIUrl":"https://doi.org/10.1109/ACCT.2015.73","url":null,"abstract":"Machine learning is the adaptive process that makes computers improve from experience, by example, and by analogy. So It is a discipline of methodologies that provides, in one form or another, intelligent information processing capabilities for handling real life. Bioinformatics is one of the application of Machine Learning. Bioinformatics is the interdisciplinary science of interpreting biological data using information technology and computer science. Machine learning (ML) focuses on automatic learning from data set. Machine learning includes the learning speed, the guarantee of convergence, and how the data can be learned incrementally. We usually refer to methods like Artificial Neural Networks (ANNs), Genetic algorithms (GAs), and Fuzzy systems along with hybrid methods including a combination of some of these methods. One of the major problems is to classify the normal genes and the invalid genes which are infected by some kind of diseases. In genomic research, classifying DNA sequences into existing categories is used to learn the functions of a new protein. So, it is important to identify those genes and classify them. In order to identify the infected genes and the normal genes with the use of classification methods here we use the machine learning techniques. This paper gives a review on the mechanisms of gene sequence classification using Machine Learning techniques, which includes a brief detail on bioinformatics, literature survey and key issues in DNA Sequencing using Machine Learning.","PeriodicalId":351783,"journal":{"name":"2015 Fifth International Conference on Advanced Computing & Communication Technologies","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-02-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114607459","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
A Taxonomy of Key Management Schemes of Wireless Sensor Networks 无线传感器网络密钥管理方案分类
P. Vamsi, K. Kant
{"title":"A Taxonomy of Key Management Schemes of Wireless Sensor Networks","authors":"P. Vamsi, K. Kant","doi":"10.1109/ACCT.2015.109","DOIUrl":"https://doi.org/10.1109/ACCT.2015.109","url":null,"abstract":"Research on secure key management in Wireless Sensor Networks (WSNs) using cryptography has gained significant attention in the research community. However, ensuring security with public key cryptography is a challenging task due to resource limitation of sensor nodes in WSNs. In recent years, numerous researchers have proposed efficient lightweight key management schemes to establish secure communication. In this paper, the authors provide a study on several key management schemes developed for WSNs and their taxonomy with respect to various network and security metrics.","PeriodicalId":351783,"journal":{"name":"2015 Fifth International Conference on Advanced Computing & Communication Technologies","volume":"433 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-02-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123558781","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Gait Based Gender Identification Approach 基于步态的性别识别方法
P. Shelke, P. R. Deshmukh
{"title":"Gait Based Gender Identification Approach","authors":"P. Shelke, P. R. Deshmukh","doi":"10.1109/ACCT.2015.66","DOIUrl":"https://doi.org/10.1109/ACCT.2015.66","url":null,"abstract":"To improve the performance of gait based human identification system, gender can plays an important role in the field of surveillance and monitoring applications. The proposed algorithm consist of four steps. In initial step, silhouette object detection is take place by using background subtraction and morphological operation. In segmentation step, silhouette body is divided into six regions. Then their gait features are extracted by using 2D discrete wavelet transform and finally the K-Nearest Neighbor (KNN) classifier is employed to classify the gender for identification of the person. To evaluate the performance of the proposed algorithm, experiments are conducted on CASIA Gait database. An experimental result shows that the proposed method is more effective for gender identification using gait biometrics. The proposed approach achieved highly competitive performance compare with earlier published methods.","PeriodicalId":351783,"journal":{"name":"2015 Fifth International Conference on Advanced Computing & Communication Technologies","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-02-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124511603","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信