2012 Third International Conference on Computing, Communication and Networking Technologies (ICCCNT'12)最新文献

筛选
英文 中文
Load balancing in Cellular Network: A review 蜂窝网络中的负载平衡:综述
A. Sharma, A. Roy, S. Ghosal, R. Chaki, U. Bhattacharya
{"title":"Load balancing in Cellular Network: A review","authors":"A. Sharma, A. Roy, S. Ghosal, R. Chaki, U. Bhattacharya","doi":"10.1109/ICCCNT.2012.6395927","DOIUrl":"https://doi.org/10.1109/ICCCNT.2012.6395927","url":null,"abstract":"Mobile Stations (MSs), in real-world systems, are not evenly distributed across cells. Thus, MSs in a hot cell are affected by the load imbalance and might unable to get services. Load balancing became one of the most active and emerging fields of research in Cellular Network. In order to balance the load among different cells, it is needed to transfer the over-loaded traffic from hot cells to neighbouring cooler ones. Various dynamic load balancing schemes to deal with the unbalanced traffic problem are already proposed. In this paper we have reviewed various techniques of load balancing in cellular network. We have also presented two comparison tables for the reviewed schemes. This work would help look at a glance to the previous works done in the area of Load Balancing in Cellular Networks.","PeriodicalId":364589,"journal":{"name":"2012 Third International Conference on Computing, Communication and Networking Technologies (ICCCNT'12)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122914974","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 20
Application checkpointing in grid environment with improved checkpoint reliability through replication 网格环境中的应用程序检查点,通过复制提高检查点可靠性
R. K. Bawa, R. Singh
{"title":"Application checkpointing in grid environment with improved checkpoint reliability through replication","authors":"R. K. Bawa, R. Singh","doi":"10.1109/ICCCNT.2012.6395974","DOIUrl":"https://doi.org/10.1109/ICCCNT.2012.6395974","url":null,"abstract":"Grid technologies are emerging as the next generation of distributed computing, allowing the aggregation of heterogeneous resources that are geographically distributed. The heterogeneous nature of the grid makes it more vulnerable to faults which lead to either the failure of the job or delay in completing the execution of the job. Checkpointing is one of the many fault tolerance techniques which are used to make Grid more efficient and reliable. In this paper we have developed an application checkpointing based fault tolerance technique for Alchemi based Grid environment. In this technique application threads generate their checkpoints and store them in the checkpoint table at the manager node. In case a thread fails checkpoint of the corresponding thread is used to resume the execution from the point of failure. This technique introduces a slight overhead in fault free situations but very effective in case of a node failure. Increased checkpoint frequency improves job's resuming capability but also increases the overhead of generating and storing checkpoints which results in increased processing time of the job.","PeriodicalId":364589,"journal":{"name":"2012 Third International Conference on Computing, Communication and Networking Technologies (ICCCNT'12)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127564679","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A parallel segmentation of brain tumor from magnetic resonance images 磁共振图像中脑肿瘤的平行分割
V. S. Dessai, M. P. Arakeri, G. Ram Mohana Reddy
{"title":"A parallel segmentation of brain tumor from magnetic resonance images","authors":"V. S. Dessai, M. P. Arakeri, G. Ram Mohana Reddy","doi":"10.1109/ICCCNT.2012.6395880","DOIUrl":"https://doi.org/10.1109/ICCCNT.2012.6395880","url":null,"abstract":"Medical image segmentation is nowadays at the core of medical image analysis and supports computer-aided diagnosis, surgical planning, intra-operative guidance or postoperative assessment. Large amounts of research efforts have been made in developing effective brain MR (magnetic resonance) image tumor segmentation methods in the past years. However algorithms proposed so far are time consuming because it involves lot of mathematical computations. Also serial segmentation of multiple MRI slices (usually required for 3D visualization) takes exponential time. This results in need for improvement in performance as far as the time complexity is concerned. This paper proposes a methodology that incorporates the K-means clustering and morphological operation for parallel segmentation of multiple MRI slices corresponding to single patient. Segmentation of multiple MRI slices for tumor extraction plays major role in 3D (Three Dimensional) visualization and serves as an input for the same. The proposed framework follows SIMD (Single Instruction Multiple Data) model and since the segmentation of individual slice is independent of each other and can be performed in parallel and multithreading definitely speeds up the entire process. Also the framework does not involve any kind of inter-process communication thus the time is saved here as well.","PeriodicalId":364589,"journal":{"name":"2012 Third International Conference on Computing, Communication and Networking Technologies (ICCCNT'12)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127661148","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Speech enhancement by speech intelligibility index in sensor network 传感器网络中语音清晰度指标的语音增强
S. Parija, P. K. Sahu, S. S. Singh
{"title":"Speech enhancement by speech intelligibility index in sensor network","authors":"S. Parija, P. K. Sahu, S. S. Singh","doi":"10.1109/ICCCNT.2012.6395950","DOIUrl":"https://doi.org/10.1109/ICCCNT.2012.6395950","url":null,"abstract":"Speech enhancement aims to improve speech quality by using various algorithms. The main objective of enhancement is to improvement in intelligibility and overall perceptual quality of degraded speech signal using audio signal processing techniques. In the field of speech enhancement, enhancing of speech means degraded by noise in its wide range of applications such as mobile phones, VoIP, teleconferencing systems etc. In general there are three different methods used to estimate speech intelligibility. Namely, Speech Intelligibility Index (SII), Speech Transmission Index (STI) and Articulation Index (AI). Here it is proposed that SII is most robust physical measure and the comparison between Speech Intelligibility index in presence of stationary noise (White Gaussian Noise) and non-stationary noise (Speech noise) is done. Simulation result shows that SII is better in presence of non-stationary noise (a female voice of sampling frequency 16 KHz). Here two wideband speech signals are considered for performance evaluation since it brings the improvement over traditional narrowband such as increases the intelligibility and enables the spatial auditory displays etc. The speech signal are generated and simulated with the MATLAB environment. The real time speech signals are recorded with the help of acoustic sensor present inside the microphone.","PeriodicalId":364589,"journal":{"name":"2012 Third International Conference on Computing, Communication and Networking Technologies (ICCCNT'12)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133679343","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Performance comparison of various adaptive filter algorithms for ECG signal enhancement and baseline wander removal 各种自适应滤波算法在心电信号增强和基线漂移去除中的性能比较
S. A. Rehman, R. Kumar, M. Rao
{"title":"Performance comparison of various adaptive filter algorithms for ECG signal enhancement and baseline wander removal","authors":"S. A. Rehman, R. Kumar, M. Rao","doi":"10.1109/ICCCNT.2012.6396032","DOIUrl":"https://doi.org/10.1109/ICCCNT.2012.6396032","url":null,"abstract":"In this paper various adaptive filter based algorithms that can be applied to ECG signal in order to remove various artifacts from them are presented. The goal of the paper is to show the comparison based on signal to noise ratio of all adaptive filter algorithms used for the analysis of ECG signals with Baseline wander noise. Simulation studies shows that the proposed novel algorithms like NLMS, SRLMS and DNLMS based on adaptive systems present better performances compared to existing realizations LMS, DLMS and NSRLMS based procedures in terms of signal to noise ratio.","PeriodicalId":364589,"journal":{"name":"2012 Third International Conference on Computing, Communication and Networking Technologies (ICCCNT'12)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132212565","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Efficient spectrum sharing and allocation schemes for throughput enhancements in a Cognitive Radio Network 认知无线网络中提高吞吐量的有效频谱共享和分配方案
V. Jayaraj, J. Amalraj
{"title":"Efficient spectrum sharing and allocation schemes for throughput enhancements in a Cognitive Radio Network","authors":"V. Jayaraj, J. Amalraj","doi":"10.1109/ICCCNT.2012.6395915","DOIUrl":"https://doi.org/10.1109/ICCCNT.2012.6395915","url":null,"abstract":"Cognitive Radio Ad Hoc Networks (CRAHNs) constitute a viable solution to solve the current problems of inefficiency in the spectrum allocation, and to deploy highly reconfigurable and self-organizing wireless networks. Cognitive Radio (CR) devices are envisaged to utilize the spectrum in an opportunistic way by dynamically accessing different licensed portions of the spectrum[1]. However the phenomena of channel fading and primary cum secondary interference in cognitive radio networks does not guarantee application demands to be achieved continuously over time.","PeriodicalId":364589,"journal":{"name":"2012 Third International Conference on Computing, Communication and Networking Technologies (ICCCNT'12)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115194315","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Computer Vision system for cashew kernel area estimation 腰果核面积估计的计算机视觉系统
Narendra V G, Dasharathraj K. Shetty, Dr Hareesh
{"title":"Computer Vision system for cashew kernel area estimation","authors":"Narendra V G, Dasharathraj K. Shetty, Dr Hareesh","doi":"10.1109/ICCCNT.2012.6395942","DOIUrl":"https://doi.org/10.1109/ICCCNT.2012.6395942","url":null,"abstract":"Carrying out Food and Agricultural product Quality Inspection manually is a laborious task. Maintaining consistent product quality is not possible due to human errors. Customer expectations are increasing day by day and seek products of high quality. However, in India the Inspection of Food and Agricultural produce is done manually in most of the cases. Work in the Computer Vision area is being extensively carried out these days to provide automated, non-destructive and cost-effective techniques to achieve this. Computer Vision uses Image processing as one of the intermediary tools to achieve the ultimate objective. Cashew is one of the important commercial crops of India. The objective of this research is to provide an image processing method for measuring cashew kernel Size (i.e. length and width/height) with an accurate and smallest relative error.","PeriodicalId":364589,"journal":{"name":"2012 Third International Conference on Computing, Communication and Networking Technologies (ICCCNT'12)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115568183","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Improving the quality of service based on route stability in MANETs Using Dynamic Source routing protocol 基于路由稳定性的动态源路由协议改进manet服务质量
S. Vinothkumar, R. Asokan
{"title":"Improving the quality of service based on route stability in MANETs Using Dynamic Source routing protocol","authors":"S. Vinothkumar, R. Asokan","doi":"10.1109/ICCCNT.2012.6395962","DOIUrl":"https://doi.org/10.1109/ICCCNT.2012.6395962","url":null,"abstract":"A Mobile Ad hoc Network (MANET) is a collection of nodes or mobile devices that communicate with each other without any centralized administrator. When a route is broken in an on-demand routing protocol, route recovery and maintenance procedures are initiated and it will consume more bandwidth and the delay will be high. To improve the performance of DSR a simple stability model is used. The stability of the route is analyzed by the received signal strength. The received signal strength from a node is higher than the threshold value the signal strength value will be stored in the neighbor information table. Using this information source select the path with high stability value and thus reduce the path break in intermediate nodes. Simulation results show improved performance in the throughput and reduce the packet loss, delay.","PeriodicalId":364589,"journal":{"name":"2012 Third International Conference on Computing, Communication and Networking Technologies (ICCCNT'12)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116067578","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Secure steganography using hybrid domain technique 使用混合域技术的安全隐写
H. Reddy, N. Sathisha, A. Kumari, K. Raja
{"title":"Secure steganography using hybrid domain technique","authors":"H. Reddy, N. Sathisha, A. Kumari, K. Raja","doi":"10.1109/ICCCNT.2012.6396010","DOIUrl":"https://doi.org/10.1109/ICCCNT.2012.6396010","url":null,"abstract":"The steganography is used to hide information and communicate in secure way to the destination. In this paper we propose Secure Steganography using Hybrid Domain Technique (SSHDT). The cover image of different formats and sizes are considered and resized to dimensions of power of 2. The Daubechies Lifting Wavelet Transforms (LWT) is applied on cover image to generate four sub bands XA, XH, XV and XD. The XD band is considered and divided into two equal blocks say upper and lower for payload embedding. The payload of different formats are considered and resized to dimensions of power of 2. The payload is fragmented into four equal blocks. The integer Haar LWT is applied on two diagonal sub bands to generate F1 and F2 blocks and remaining two diagonal sub bands are retained in the spatial domain itself say S1 and S2. The S1, S2. F1 and F2 matrix are converted into single columns. The bit reversal is applied on each element of a column to scramble the payload index bit positions. The cube root is applied on coefficient of index value to scale down the magnitudes. The integer part is considered for embedding in XD band only of cover image to generate stego object. The Decision Factor Based Manipulation (DFBM) is used to scramble further stego object to improve security to the payload. Dubechies Inverse LWT (ILWT) is applied on XA, XH, XV and XD stego object to obtain stego image in spatial domain. it is observed that PSNR and embedding capacity of the proposed algorithm is better compared to the existing algorithm.","PeriodicalId":364589,"journal":{"name":"2012 Third International Conference on Computing, Communication and Networking Technologies (ICCCNT'12)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123039919","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Conceptual study and operational overview on Variable Frequency Transformer used for grid interconnections 电网互联用变频变压器的概念研究与运行概述
V. R. Vanajaa, N. A. Vasanthi
{"title":"Conceptual study and operational overview on Variable Frequency Transformer used for grid interconnections","authors":"V. R. Vanajaa, N. A. Vasanthi","doi":"10.1109/ICCCNT.2012.6395955","DOIUrl":"https://doi.org/10.1109/ICCCNT.2012.6395955","url":null,"abstract":"Electric-power transmission is the bulk transfer of electrical energy, from generating power plants to electrical substations located near demand centers. Electricity is transmitted at high voltages (110 kV or above) to reduce the energy lost in long-distance transmission. Since 2004, an alternative technology has been in commercial operation in North America, which has proven to be a reliable and stable vehicle to move power between two points. The two points in question need not be synchronous. This technology is the Variable Frequency Transformer, or VFT. Variable frequency transformers provide transmission solutions for a smarter grid, enabling transmission system operators to control power flows between power grids with high reliability, speed and efficiency, while offering flexibility It is a controllable, bi-directional transmission device that can transfer power between asynchronous networks. Variable Frequency Transformers can convert this power to and from grids without converting the power into DC thus eliminating the harmonic distortions. Another advantage with VFT is that we can have infinite phase shifts between the two powers where as in conventional devices we could have only few predefined phase shifts. This paper introduces the VFT and provides a brief explanation of the technology and its benefits.","PeriodicalId":364589,"journal":{"name":"2012 Third International Conference on Computing, Communication and Networking Technologies (ICCCNT'12)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124675811","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信