2012 Third International Conference on Computing, Communication and Networking Technologies (ICCCNT'12)最新文献

筛选
英文 中文
A reconfigurable DCT/IDCT architecture for video codec: A Review 一种用于视频编解码器的可重构DCT/IDCT体系结构综述
B. Caroline, G. Sheeba, J. Jeyarani, F. S. R. Mary
{"title":"A reconfigurable DCT/IDCT architecture for video codec: A Review","authors":"B. Caroline, G. Sheeba, J. Jeyarani, F. S. R. Mary","doi":"10.1109/ICCCNT.2012.6396054","DOIUrl":"https://doi.org/10.1109/ICCCNT.2012.6396054","url":null,"abstract":"Among various transform techniques for image compression, the Discrete Cosine Transform (DCT) is the most popular and effective one in practical applications because it gives an almost optimal performance and can be implemented at an acceptable cost. The transform coding utilizing the Discrete Cosine Transform (DCT) has been commonly adopted in the various standards for image compression. These include the CCITT standard for video telephony, the JPEG (Joint Photographic Expert Group) standard for coloured still-image transmission and the MPEG (Motion Pictures Expert Group) standard for pictures on the storage media. MPEG was originally developed for digital television, its popularity and effectiveness as a storage/transmission format and abundance of content have made it attractive for use in personal video playback devices. DCT based coding schemes are also used for higher quality applications such as HDTV. Therefore, an architecture which rapidly computes DCT has become a key component of image compression VLSIs. This paper reviews the existing efficient algorithms for implementing the reconfigurable Discrete Cosine Transform (DCT)/ Inverse Discrete Cosine Transform (IDCT) architecture for multimedia applications and proposed an algorithm which offers high speed and reduced area. The proposed architecture uses an error compensated adder tree to perform shifting and addition operations. The reconfigurable architecture not only decreases the time of research and development but also saves fabrication cost. The advantages of the proposed architecture are that this architecture does not require multipliers and ROM. It only needs adders and shifters. In digital circuits, the area of the multipliers and ROM are larger than adders and shifters.","PeriodicalId":364589,"journal":{"name":"2012 Third International Conference on Computing, Communication and Networking Technologies (ICCCNT'12)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121348237","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Performance analysis of two hop bandwidth request for heterogeneous WiMAX networks 异构WiMAX网络两跳带宽请求的性能分析
R. Anbazhagan, N. Rangaswamy
{"title":"Performance analysis of two hop bandwidth request for heterogeneous WiMAX networks","authors":"R. Anbazhagan, N. Rangaswamy","doi":"10.1109/ICCCNT.2012.6395862","DOIUrl":"https://doi.org/10.1109/ICCCNT.2012.6395862","url":null,"abstract":"WiMAX-WLAN gateway (WWG) in heterogeneous WiMAX networks were configured to aggregate and route traffic from WiMAX and WLAN mobile stations (MSs) that is out of coverage with base station (BS) and access point, respectively. However, previous studies on bandwidth request (BR) mechanism at WWG are carried out using either polling or bandwidth reservation for best effort (BE) services. These studies suffer from low spectral efficiency with WiMAX network and cause unfairness to WiMAX MSs while contention based BR is carried out from WiMAX MS to BS (via WWG). To overcome these limitations, we suggest three variants of contention based bandwidth request namely message based BR, CDMA or code based BR and heterogeneous BR. Simulations validate the proposed mechanisms in terms of throughput, connection delay and queuing delay. It is inferred that with heterogeneous BR, the network throughput is improved by 11.21%, the connection delay at WWG is reduced by 5.85%, the queuing delay at WWG is reduced by 9.47%, the MAC delay at WLAN MS is reduced by 9.09% and the average access delay at WiMAX MS is reduced by 62.12% compared to message and CDMA based BR.","PeriodicalId":364589,"journal":{"name":"2012 Third International Conference on Computing, Communication and Networking Technologies (ICCCNT'12)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127646943","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A survey on SQL injection attacks, detection and prevention techniques SQL注入攻击、检测和预防技术综述
P. Kumar, R. Pateriya
{"title":"A survey on SQL injection attacks, detection and prevention techniques","authors":"P. Kumar, R. Pateriya","doi":"10.1109/ICCCNT.2012.6396096","DOIUrl":"https://doi.org/10.1109/ICCCNT.2012.6396096","url":null,"abstract":"SQL Injection poses a serious security issue over the Internet or over web application. In SQL injection attacks, hackers can take advantage of poorly coded Web application software to introduce malicious code into the organization's systems and network. The vulnerability exists when a Web application do not properly filter or validate the entered data by a user on a Web page. Large Web applications have hundreds of places where users can input data, each of which can provide a SQL injection opportunity. Attacker can steal confidential data of the organization with these attacks resulting loss of market value of the organization. This paper presents an effective survey of SQL Injection attack, detection and prevention techniques.","PeriodicalId":364589,"journal":{"name":"2012 Third International Conference on Computing, Communication and Networking Technologies (ICCCNT'12)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126200938","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 62
Optimal allocation of testing resource for modular software based on testing-effort dependent software reliability growth 基于测试工作量依赖软件可靠性增长的模块化软件测试资源优化分配
N. Ahmad, M. G. M. Khan, Syed Faizul Islam
{"title":"Optimal allocation of testing resource for modular software based on testing-effort dependent software reliability growth","authors":"N. Ahmad, M. G. M. Khan, Syed Faizul Islam","doi":"10.1109/ICCCNT.2012.6395885","DOIUrl":"https://doi.org/10.1109/ICCCNT.2012.6395885","url":null,"abstract":"Software reliability is a key factor in software development process. Testing phase of software begins with module testing whereby, modules are tested independently to remove substantial amount of faults within a specified testing resource. Therefore, the available resource must be allocated among the modules in such a way that number of faults is removed as much as possible from each of the module to achieve higher software reliability. In this paper two optimization problem are discussed for optimal allocation of testing resources for the modular software system. These optimization problems are formulated as nonlinear programming problems (NLPP), which are modeled by a software reliability growth model based on a non-homogeneous Poisson process which incorporated Log-logistic testing-effort function. LINGO program is used to solve the optimization problems. Finally, numerical examples are given to illustrate the procedure developed in this paper. It is shown that the optimal allocation of testing-resources among software modules can improve software reliability.","PeriodicalId":364589,"journal":{"name":"2012 Third International Conference on Computing, Communication and Networking Technologies (ICCCNT'12)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128037359","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Intelligent machine to machine communication in home area network for smart grid 面向智能电网的家庭局域网智能机对机通信
N. Sahu, V. Dehalwar
{"title":"Intelligent machine to machine communication in home area network for smart grid","authors":"N. Sahu, V. Dehalwar","doi":"10.1109/ICCCNT.2012.6396053","DOIUrl":"https://doi.org/10.1109/ICCCNT.2012.6396053","url":null,"abstract":"The machine to machine communication in Home Area Network (HAN) having a great impact on building a powerful smart grid. With recent advances in M2M technologies, SG smart meters are not only collecting the information about the energy consumed, but also detailed energy consumption pattern and also used for analyzing future demand of utilities. Information and communication technology is playing very important role in transforming Power grids to Smart grid. However, there are many challenges in the design of the Smart grid communications network whereby the electrical appliances and smart meters are able to exchange information pertaining to varying power requirements. Furthermore, different types of M2M gateways are required at different points of the SG communication network. This article surveys a number of existing communication technologies that can be adopted for M2M communication in HAN for SG and also explained the various challenges that the M2M communication in HAN for Smart Grid is facing. Furthermore, a possible solution to deal with these challenges and to improve Machine to machine communication in HAN for Smart Grid is also presented.","PeriodicalId":364589,"journal":{"name":"2012 Third International Conference on Computing, Communication and Networking Technologies (ICCCNT'12)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127983483","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Spatial load distribution of base station in vehicular network 车载网络中基站的空间负载分布
K. Ravikumar, R. Suganya
{"title":"Spatial load distribution of base station in vehicular network","authors":"K. Ravikumar, R. Suganya","doi":"10.1109/ICCCNT.2012.6395893","DOIUrl":"https://doi.org/10.1109/ICCCNT.2012.6395893","url":null,"abstract":"In vehicular ad hoc network (VANET) it is possible to locate and trace a vehicle based on its transmission. During communication with other vehicle or road-side infrastructure. The VANET systems need to aim for balance between base station on the performance of traffic - and environment - aware mobile ad hoc network (MANET) consist of mobiles nodes that connect themselves in a decentralized, self-organizing manner and may also establish multi-hop routes. If mobile nodes are car this is called vehicular ad hoc Network (VANET). The key idea is to use base-station coordination that is spatial load distribution and the environment to exploit the performance of network connectivity and to achieve the base-station balance.","PeriodicalId":364589,"journal":{"name":"2012 Third International Conference on Computing, Communication and Networking Technologies (ICCCNT'12)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121590653","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Artificial neural network modeling for road traffic noise prediction 道路交通噪声预测的人工神经网络建模
K. Kumar, M. Parida, V. K. Katiyar
{"title":"Artificial neural network modeling for road traffic noise prediction","authors":"K. Kumar, M. Parida, V. K. Katiyar","doi":"10.1109/ICCCNT.2012.6395944","DOIUrl":"https://doi.org/10.1109/ICCCNT.2012.6395944","url":null,"abstract":"Several attempts have been made by the researchers to predict and model urban road traffic noise mathematically and statistically. There has been a lot of interest in the new techniques for analyzing data. Neural networks offer a new strategy with enormous potential for many tasks in the domain of geospatial planning. ANN technique for modeling provides smaller errors in comparison to other classical methods. Neural networks have been applied to many interesting problems in various areas including road traffic noise prediction. In the present study an attempt has been made to explore the application of neural networks to road traffic noise prediction in Lucknow city, capital of Uttar Pradesh, India. Traffic volume, speed and noise level data were collected at ten selected locations. For development of model, classified traffic volume (Car/Jeep/Van, Scooter/ Motorcycle, LCV/ Minibus, Bus, Truck and 3-Wheeler), traffic speed on both sides of the road were taken as input data. Output was estimated as Leq. Performance of the model was tested by root mean square error (RMSE), mean absolute error (MAE) and coefficient of correlation (R). It was observed that there is no significant difference between observed and predicted noise levels in the present case, indicating the accuracy of model.","PeriodicalId":364589,"journal":{"name":"2012 Third International Conference on Computing, Communication and Networking Technologies (ICCCNT'12)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132122764","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Detecting eye movement direction from stimulated Electro-oculogram by intelligent algorithms 利用智能算法从受刺激眼电图中检测眼球运动方向
A. Banerjee, A. Konar, D. Tibarewala, R. Janarthanan
{"title":"Detecting eye movement direction from stimulated Electro-oculogram by intelligent algorithms","authors":"A. Banerjee, A. Konar, D. Tibarewala, R. Janarthanan","doi":"10.1109/ICCCNT.2012.6395881","DOIUrl":"https://doi.org/10.1109/ICCCNT.2012.6395881","url":null,"abstract":"To improve the quality of life of many physically challenged people Human computer interfacing is an emerging alternative. Human computer interface such as intelligent rehabilitation aids can be controlled by eye movements. It can be helpful for severely paralyzed people. Electro-oculography is a simple method to track eye movements. Electro-oculogram (EOG) is the biopotential produced in the surrounding region of eye due to eye ball movements. The signal is easy to acquire using surface electrodes placed around the eye. This paper presents a comparative study of different methods for Electro-oculogram classification to utilize it to control rehabilitation aids. In this experiment, Electro-oculogram is acquired with a designed data acquisition system and the wavelet transform coefficients and statistical parameters are extracted as signal features. Those features are used to classify the movements of the eyeball in left and right direction. Classification is done by linear & quadratic discriminant analysis, K-nearest neighbor method, linear support vector machines and artificial neural network with backpropagation algorithm. In comparative study good accuracy (above 75%) has been observed in all cases but KNN showed better performance. Based on these classified signals control commands can be generated for human computer interface.","PeriodicalId":364589,"journal":{"name":"2012 Third International Conference on Computing, Communication and Networking Technologies (ICCCNT'12)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130435573","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Study of OFDM system and performance investigation for various channel models OFDM系统的研究及各种信道模型的性能研究
A. Dubey, P. Tavde, K. Kulat
{"title":"Study of OFDM system and performance investigation for various channel models","authors":"A. Dubey, P. Tavde, K. Kulat","doi":"10.1109/ICCCNT.2012.6395970","DOIUrl":"https://doi.org/10.1109/ICCCNT.2012.6395970","url":null,"abstract":"In recent time OFDM uses as a Transmission technique in Mobile radio communication like 3G, Multimedia and Voice transmission. Due to its many advantage, OFDM has become the modern choices for these system. OFDM use multicarrier to transmit data symbol. OFDM divide the high data rate frame into multiple low data rate frame. As we know that low data rate frame has higher symbol period. This enables OFDM to reduce the effect of multipath, impulse noise etc to a great extend. Whereas single carrier system does not have capability to reduce multipath effect. This Paper describe the study and investigate the performance of OFDM system under different channel models like AWGN, Multipath, Rician. Effect has been also taken to provide BER calculation for different modulation scheme such as BPSK, QPSK and 16PSK. To get the standard BER (10-3) analysis, the simulation has been carried out, gives the minimum power requirement for particular modulation technique with a suitable data rate.","PeriodicalId":364589,"journal":{"name":"2012 Third International Conference on Computing, Communication and Networking Technologies (ICCCNT'12)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134093991","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Implementing prototype model for School Security System (SSS) using RFID 利用RFID技术实现学校保安系统的原型模型
C. Deenadayalan, M. Murali, L. R. Baanupriya
{"title":"Implementing prototype model for School Security System (SSS) using RFID","authors":"C. Deenadayalan, M. Murali, L. R. Baanupriya","doi":"10.1109/ICCCNT.2012.6396090","DOIUrl":"https://doi.org/10.1109/ICCCNT.2012.6396090","url":null,"abstract":"Now days, the number of crime over children is increasing day by day. the implementation of School Security System(SSS) via RFID to avoid crime, illegal activates by students and reduce worries among parents. The project is the combination of latest Technology using RFID, GPS/GSM, image processing, WSN and web based development using Php,VB.net language apache web server and SQL. By using RFID technology it is easy track the student thus enhances the security and safety in selected zone. The information about student such as in time and out time from Bus and campus will be recorded to web based system and the GPS/GSM system automatically sends information (SMS / Phone Call) toothier parents. That the student arrived to Bus/Campus safely.","PeriodicalId":364589,"journal":{"name":"2012 Third International Conference on Computing, Communication and Networking Technologies (ICCCNT'12)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134184909","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信