2012 Third International Conference on Computing, Communication and Networking Technologies (ICCCNT'12)最新文献

筛选
英文 中文
Design of high gain Wang shape microstrip patch antenna for wireless system 无线系统中高增益王氏微带贴片天线的设计
S. Sharma
{"title":"Design of high gain Wang shape microstrip patch antenna for wireless system","authors":"S. Sharma","doi":"10.1109/ICCCNT.2012.6396026","DOIUrl":"https://doi.org/10.1109/ICCCNT.2012.6396026","url":null,"abstract":"In this paper, a novel Wang shape slotted microstrip patch antenna with high gain is presented and discussed. The proposed design offers low profile, very high gain and compact antenna element. The maximum gain is 12 dBi to 12.60 dBi from 1.82 GHz to 1.99GHz, antenna and radiation efficiency are more than 90% and bandwidth is 9% from 1.82GHz to 1.99GHz .The proposed design is suitable particular for wireless communication application such as WiFi and WLAN.","PeriodicalId":364589,"journal":{"name":"2012 Third International Conference on Computing, Communication and Networking Technologies (ICCCNT'12)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124805508","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Context based domain identification for resolving ambiguity 用于解决歧义的基于上下文的域识别
P. Saktel, U. Shrawankar
{"title":"Context based domain identification for resolving ambiguity","authors":"P. Saktel, U. Shrawankar","doi":"10.1109/ICCCNT.2012.6396060","DOIUrl":"https://doi.org/10.1109/ICCCNT.2012.6396060","url":null,"abstract":"Context based Domain identification is a task of identifying correct domain of a word from the sentence. Domain identification is used to resolve ambiguity of words based on context of sentence. Context is a unique proof of meaning and its sentence. Hence, using this unique utility ambiguity is resolved. In this paper, the three stages are discussed which describes the previous and proposed work. This paper briefly focuses on second stage. The second stage describes the technique used to identify domain. After identification how the system is trained to select correct domain is explained. Lastly, the related results are shown. This paper describes usefulness of resolving ambiguity, which helps people to understand meaning of the sentence.","PeriodicalId":364589,"journal":{"name":"2012 Third International Conference on Computing, Communication and Networking Technologies (ICCCNT'12)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125010585","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Enhanced route discovery in Mobile Adhoc Networks 移动Adhoc网络中增强的路由发现
S. Ali
{"title":"Enhanced route discovery in Mobile Adhoc Networks","authors":"S. Ali","doi":"10.1109/ICCCNT.2012.6395894","DOIUrl":"https://doi.org/10.1109/ICCCNT.2012.6395894","url":null,"abstract":"Mobile Adhoc Network (MANET) is a collection of wireless mobile nodes. In MANET nodes are self-motivated topologies can arbitrarily change their geographic locations. MANET consists of wireless links with considerable bandwidth. Packet delivery needs routing protocol to transmit a packet from source to destination. In such a network, nodes move, the established paths may break and the routing protocols must dynamically search for other feasible routes. Numerous protocols have been developed for mobile ad hoc mobile networks. Such protocols must deal with the typical limitations of these networks, which include high power consumption, low bandwidth and high error rates. These MANETs routing protocols are categorized in to Proactive Routing Protocols (PRP), Reactive Routing Protocols (RRP) and Hybrid Routing Protocols (HRP). This paper presents routing in wireless mobile ad-hoc networks using Destination Sequenced Distance Vector (DSDV) and Ad-hoc on demand Distance Vector (AODV) protocols. The performance of bandwidth, throughput and packet loss of DSDV and AODV has been modeled under various network configurations and mobility conditions. These mechanics can lead to significant performance differentials. The results are justified through NS-2 simulation.","PeriodicalId":364589,"journal":{"name":"2012 Third International Conference on Computing, Communication and Networking Technologies (ICCCNT'12)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128548015","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Wireless sensor network for river water quality monitoring in India 印度用于河流水质监测的无线传感器网络
K. A. Menon, D. P, M. Ramesh
{"title":"Wireless sensor network for river water quality monitoring in India","authors":"K. A. Menon, D. P, M. Ramesh","doi":"10.1109/ICCCNT.2012.6512437","DOIUrl":"https://doi.org/10.1109/ICCCNT.2012.6512437","url":null,"abstract":"Water is an important natural resource which needs constant quality monitoring for ensuring its safe use. This paper introduces a river water quality monitoring system based on wireless sensor network which helps in continuous and remote monitoring of the water quality data in India. The wireless sensor node in the system is designed for monitoring the pH of water, which is one of the main parameters that affect the quality of water. The proposed sensor node design mainly comprises of a signal conditioning module, processing module, wireless communication module and the power module. The sensed pH value will be wirelessly transmitted to the base station using Zigbee communication after the required signal conditioning and processing techniques. The circuit for the sensor node is designed, simulated and the hardware prototype is developed using the appropriate components which minimize the power requirement of the system and provides a cost effective platform for monitoring water quality.","PeriodicalId":364589,"journal":{"name":"2012 Third International Conference on Computing, Communication and Networking Technologies (ICCCNT'12)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127121206","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 40
Security of cloud computing system using object oriented technique 基于面向对象技术的云计算系统安全
S. Shukla, Rakesh Kumar Singh
{"title":"Security of cloud computing system using object oriented technique","authors":"S. Shukla, Rakesh Kumar Singh","doi":"10.1109/ICCCNT.2012.6395865","DOIUrl":"https://doi.org/10.1109/ICCCNT.2012.6395865","url":null,"abstract":"Cloud computing is a new emerging technology. It has been coming forth as an alternative computing environment where web-based services allow for different kinds of users to obtain a large variety of resources, such as software and hardware. Cloud Computing provides a way to share large amount of distributed resources belonging to different organizations through the internet, So it is prone to several types of security risks. Therefore a systematic methodology and process are indispensable to analyze security requirements. The Security policies should be developed for cloud computing systems at multiple levels to threats, risk and vulnerability. Here we discuss about a high order object oriented techniques and methods for construction of robust security policy to build cloud system more reliable and trustworthy.","PeriodicalId":364589,"journal":{"name":"2012 Third International Conference on Computing, Communication and Networking Technologies (ICCCNT'12)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127160858","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Load frequency control using battery energy storage system in interconnected power system 基于电池储能系统的互联电力系统负荷频率控制
S. Kalyani, S. Nagalakshmi, R. Marisha
{"title":"Load frequency control using battery energy storage system in interconnected power system","authors":"S. Kalyani, S. Nagalakshmi, R. Marisha","doi":"10.1109/ICCCNT.2012.6396052","DOIUrl":"https://doi.org/10.1109/ICCCNT.2012.6396052","url":null,"abstract":"The main objective of Load Frequency Control (LFC) is to regulate the power output of the generator within an area in response to changes in system frequency and tie-line loading. LFC helps in maintaining the scheduled system frequency and tie-line power interchange with the other areas within the prescribed limits. The conventional controllers are slow and do not allow the controller designer to take into account possible changes in operating condition and non-linearities in the generator unit. When there is a variation in the load demand on a generating unit, there is a momenterial occurrence of unbalance between real power input and output. To compensate this power imbalance, an external Battery Energy Storage (BES) system is incorporated. Frequency oscillations due to large load disturbance can be effectively damped by fast acting energy storage devices such as Battery Energy Storage systems. The energy storage devices share the sudden changes in power requirement in the load. This paper presents the qualitative and quantitative comparison of conventional controllers and BES system in Load Frequency Control (LFC) of a typical two area interconnected power system. The superiority of the performance of BES over conventional controllers is highlighted and discussed in this paper.","PeriodicalId":364589,"journal":{"name":"2012 Third International Conference on Computing, Communication and Networking Technologies (ICCCNT'12)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130534466","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 35
Iterative TD-BPM for modeling ultrashort pulse in z-variant optical structures 变z光学结构中超短脉冲的迭代TD-BPM建模
M. S. Akond, H. M. Masoudi
{"title":"Iterative TD-BPM for modeling ultrashort pulse in z-variant optical structures","authors":"M. S. Akond, H. M. Masoudi","doi":"10.1109/ICCCNT.2012.6396087","DOIUrl":"https://doi.org/10.1109/ICCCNT.2012.6396087","url":null,"abstract":"In this work, the Iterative Time Domain Beam Propagation Method (TD-BPM) has been implemented in the propagation of femtosecond pulsed beam inside two dimensional Y-junction. Being an implicit technique, it is free from Courant-Friedrichs-Lewy (CFL) stability criteria. Moreover, the mesh grid (Δx) and the propagation step (Δz) sizes are much more relaxed compared to the explicit one, such as the Finite Difference Time Domain (FDTD)technique. In order to verify the result, the FDTD has been implemented on the same problem and the result has been compared. The comparison shows a good agreement between the techniques.","PeriodicalId":364589,"journal":{"name":"2012 Third International Conference on Computing, Communication and Networking Technologies (ICCCNT'12)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130655511","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Database intrusion detection by transaction signature 基于事务签名的数据库入侵检测
Y. Rathod, M. Chaudhari, G. Jethava
{"title":"Database intrusion detection by transaction signature","authors":"Y. Rathod, M. Chaudhari, G. Jethava","doi":"10.1109/ICCCNT.2012.6395997","DOIUrl":"https://doi.org/10.1109/ICCCNT.2012.6395997","url":null,"abstract":"In this paper we propose an approach for intrusion detection system for database management system .Our approach concentrate on security policies for transactions permitted with DBMS. Our approach is designed to mine audit log of legitimate transaction performed with database and generate signature for legal transactions as per security policy. The transactions not compliant to signature of valid transaction are identifies as malicious transaction. As security mechanism available with DBMS is not enough to detect intrusive actions, privilege users or unauthorized users executes malicious transaction to access crucial data. So security features can be enhancing by adding intrusive detection technology to Database management system.","PeriodicalId":364589,"journal":{"name":"2012 Third International Conference on Computing, Communication and Networking Technologies (ICCCNT'12)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130969420","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Pattern reconfigurable Ultra Wideband thin antenna 方向图可重构超宽带薄天线
R. Shobanasree, S. Radha, P. H. Rao
{"title":"Pattern reconfigurable Ultra Wideband thin antenna","authors":"R. Shobanasree, S. Radha, P. H. Rao","doi":"10.1109/ICCCNT.2012.6395996","DOIUrl":"https://doi.org/10.1109/ICCCNT.2012.6395996","url":null,"abstract":"An Ultra Wideband (UWB) monopole antenna on a shaped ground plane is presented. This compact and thin antenna operates from 3.1 to 10.6 GHz. The radiating element is created by stitching the conductive thread instead of the copper metallization. The ground plane is created by using a Liquid Crystal Polymer (LCP)material(ε r=2.9). The substrate of the designed antenna is made from jeans fabric (ε r=1.7) while the radiating element is made from stainless steel coated conductive thread. By changing the shaped ground, the direction of the radiation pattern can be changed. Radiation pattern is steered over an angle of 60 degrees on the both the sides of beam pointing angle.","PeriodicalId":364589,"journal":{"name":"2012 Third International Conference on Computing, Communication and Networking Technologies (ICCCNT'12)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125509113","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
VM provisioning policies to improve the profit of cloud infrastructure service providers 虚拟机发放策略,提高云基础设施服务提供商的利润
K. Patel, A. Sarje
{"title":"VM provisioning policies to improve the profit of cloud infrastructure service providers","authors":"K. Patel, A. Sarje","doi":"10.1109/ICCCNT.2012.6395956","DOIUrl":"https://doi.org/10.1109/ICCCNT.2012.6395956","url":null,"abstract":"Cloud computing is an emerging technology in the IT world. Some features of cloud, such as low cost, scalability, robustness and availability are attracting large-scale industries as well as small business towards cloud. A virtual machine (VM) can be defined as a software that can run its own operating systems and applications like an operating system in physical computer. As the number of users increases, allocation of resources and scheduling become a complex task. The optimization of VM provisioning policies offer improvement like increasing provider's profit, energy savings and load balancing in large data centres. In cloud computing when resource requirement of user's requests exceed resources limits of cloud provider, to fulfil the requests the cloud provider outsources to other cloud providers resources, this concept is known as cloud federation. In this paper we propose an algorithm for VM provisioning in federated cloud environment. The approach tries to improve the cloud providers profit. We have used the CloudSim to find-out the results and result show that how Cloud federation help to Cloud providers in order to improve its profit.","PeriodicalId":364589,"journal":{"name":"2012 Third International Conference on Computing, Communication and Networking Technologies (ICCCNT'12)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125519672","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 25
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信