2013 Tenth International Conference on Wireless and Optical Communications Networks (WOCN)最新文献

筛选
英文 中文
Parametric analysis of impact of jamming in wireless sensor networks 无线传感器网络中干扰影响的参数分析
Sethuraman N. Rao, S. Deepak, P. Pradeep
{"title":"Parametric analysis of impact of jamming in wireless sensor networks","authors":"Sethuraman N. Rao, S. Deepak, P. Pradeep","doi":"10.1109/WOCN.2013.6616191","DOIUrl":"https://doi.org/10.1109/WOCN.2013.6616191","url":null,"abstract":"Jamming-based denial of service attacks are a real threat in wireless sensor networks. This paper studies and analyzes the impact of jamming on micaz motes running TinyOS and explores ways to mitigate the impact. Jamming is facilitated by disabling carrier sensing on the jammer nodes. Jamming attack is detected by tracking RSSI and PDR at the receiver. By varying several parameters at the sender such as power level, packet size, distance from the jammer etc., various jamming mitigation methods are explored and the results presented along with theoretical analysis.","PeriodicalId":388309,"journal":{"name":"2013 Tenth International Conference on Wireless and Optical Communications Networks (WOCN)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130795760","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Comparative analysis of speech enhancement methods 语音增强方法的比较分析
Pankai Gael, M. Chandra, P. Saxena, V. Gupta
{"title":"Comparative analysis of speech enhancement methods","authors":"Pankai Gael, M. Chandra, P. Saxena, V. Gupta","doi":"10.1109/WOCN.2013.6616238","DOIUrl":"https://doi.org/10.1109/WOCN.2013.6616238","url":null,"abstract":"In this paper, comparative analysis of various speech enhancement methods in different noisy environments is presented. Speech signal corrupted with car noise and F16 noise is used for analysis. Spectral Subtraction, Iterative Spectral Subtraction, Geometrical Approach and Wiener filtering based methods, TSNR (Two Step Noise Reduction) and HRNR (Harmonic Regeneration Noise Reduction) methods are implemented in frequency domain for speech enhancement. Simulations are done on MATLAB7.3. The HRNR gives a maximum 35.77dB improvement in SNR for car noise and a maximum 30.54dB improvement in SNR for F16 noise at -10dB input SNR level.","PeriodicalId":388309,"journal":{"name":"2013 Tenth International Conference on Wireless and Optical Communications Networks (WOCN)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128869683","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Incitement rational nodes to cooperation in wireless networks based on IPD game 基于IPD博弈的无线网络理性节点合作激励
M. Arghavani, M. Karampanah, S. Abasi, R. Rezaee
{"title":"Incitement rational nodes to cooperation in wireless networks based on IPD game","authors":"M. Arghavani, M. Karampanah, S. Abasi, R. Rezaee","doi":"10.1109/WOCN.2013.6616229","DOIUrl":"https://doi.org/10.1109/WOCN.2013.6616229","url":null,"abstract":"In traditional wireless networks, such as mobile ad hoc networks and sensor networks, most works are done on the basis of cooperation between nodes. In such networks, each node acts both as a host node and a network infrastructure. Because, on one hand it sends its own data, and on the other hand it forwards other node's packets. In this paper, instead of traditional network, we consider a network of rational nodes, that is, in this network each node itself can decide whether to cooperate with its neighbors or not. Since, for each node, directing other node's packets cause to spend cost, logical nodes are reluctant to drive data packets for other nodes. Thus, we have decided to model and analyze the collaboration among nodes by using game theory. We have also tried to represent a strategy in which nodes are encouraged to cooperate with each other.","PeriodicalId":388309,"journal":{"name":"2013 Tenth International Conference on Wireless and Optical Communications Networks (WOCN)","volume":"205 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114201026","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Study of intrusion detection system for DDoS attacks in cloud computing 云计算中针对DDoS攻击的入侵检测系统研究
N. Kumar, Shalini Sharma
{"title":"Study of intrusion detection system for DDoS attacks in cloud computing","authors":"N. Kumar, Shalini Sharma","doi":"10.1109/WOCN.2013.6616255","DOIUrl":"https://doi.org/10.1109/WOCN.2013.6616255","url":null,"abstract":"The cloud computing has grown as a promising business concept as well as one of the fastest growing segment of IT industry in the last few years. However the popularity of Cloud Computing is increasing day by day but there are some challenges that are faced by it. One of the main challenges of Cloud is security. From past few years, DDoS attacks have been placed first on the list of cloud attacks. DDos can have serious consequences, especially on the companies dependent on the internet for their business. Thus, to reduce an impact of DoS DDoS is one of the alarming issues. This paper focuses on the study of DDoS attacks in cloud and the Intrusion Detection Systems available to cope up with the issue.","PeriodicalId":388309,"journal":{"name":"2013 Tenth International Conference on Wireless and Optical Communications Networks (WOCN)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132940908","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 25
Performance evaluation of MIMO-OFDM system using Matlab® Simulink with real time image input 基于Matlab®Simulink的MIMO-OFDM系统实时图像输入性能评估
A. Ogale, Shubhangi Chaoudhary, A. J. Patil
{"title":"Performance evaluation of MIMO-OFDM system using Matlab® Simulink with real time image input","authors":"A. Ogale, Shubhangi Chaoudhary, A. J. Patil","doi":"10.1109/WOCN.2013.6616176","DOIUrl":"https://doi.org/10.1109/WOCN.2013.6616176","url":null,"abstract":"Multiple Transmit and receive antenna are now widely used to form multiple input., multiple output (MIMO) channels to increase the capacity as well as to reduce the Bit Error Rate (BER). This paper describes the combination of MIMO system along with Orthogonal Frequency Division Multiplexing (OFDM) system which offers important features of both the system. Use of Hybrid MIMO-OFDM system is considered broadly for wideband transmission to mitigate Intersymbol interference to enhance the system performance. In this study 2 × 1 and 2×2 Hybrid MIMO-OFDM system is studied and Matlab-Simulink technique is used for the analysis for these systems. The performance of MIMO-OFDM model is measured in terms of BER and Throughput results of system analyzed with 64 QAM taking image as an input. The result shows that adding one antenna at the receiver side can improve the performance of the system.","PeriodicalId":388309,"journal":{"name":"2013 Tenth International Conference on Wireless and Optical Communications Networks (WOCN)","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131873863","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
GSM and PSTN gateway for asterisk EPBX 用于星号EPBX的GSM和PSTN网关
P. Gupta, Neha Agrawal, M. Qadeer
{"title":"GSM and PSTN gateway for asterisk EPBX","authors":"P. Gupta, Neha Agrawal, M. Qadeer","doi":"10.1109/WOCN.2013.6616225","DOIUrl":"https://doi.org/10.1109/WOCN.2013.6616225","url":null,"abstract":"This paper intends to describe the voice and video calling on mobile phones and PCs', as well as the GSM integration with asterisk PBX server. The clients can register on the asterisk server through mobile phones or PCs'. The devices should be connected to the server via wireless or wired LAN. The registered clients can make free voice and video calls to communicate among themselves. The clients can call among themselves even if they are registered on two different asterisk servers, if the servers are connected through IAX protocol. The gateway is used to route VoIP calls on to the PSTN network (GSM as well as landline) and vice-versa. 4-port FXO/FXS card is used for implementing PSTN gateway while a Bluetooth enabled mobile phone compatible with asterisk server is used to implement the GSM gateway. This model will drastically reduce the overall cost of communication.","PeriodicalId":388309,"journal":{"name":"2013 Tenth International Conference on Wireless and Optical Communications Networks (WOCN)","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134304399","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Comprehensive monitoring of firefighters by a Wireless Body Area Sensor Network 无线身体区域传感器网络对消防员的全面监控
Saibal K. Ghosh, Suryadip Chakraborty, Anagha Jamthe, D. Agrawal
{"title":"Comprehensive monitoring of firefighters by a Wireless Body Area Sensor Network","authors":"Saibal K. Ghosh, Suryadip Chakraborty, Anagha Jamthe, D. Agrawal","doi":"10.1109/WOCN.2013.6616245","DOIUrl":"https://doi.org/10.1109/WOCN.2013.6616245","url":null,"abstract":"Current research suggests that firefighters are under high risks of cardiac attacks due to heat stress and high physiological exertion. Thus, it is very important to track the location of firefighters in a real fire scenario, so as to alert the fire crew chief during a medical emergency. In this paper, we use Wireless Body Area Sensor Networks (WBASN) to gather various physiological data from monitoring devices and constantly monitor the firefighters in training or in action. A fire disaster is also a source of potentially hazardous gases. Therefore, systems should be developed that can monitor the level of such gases in the vicinity of the firefighters and generate appropriate alarms if levels of such gases exceed the prescribed safe levels. We also propose to set up wireless sensor devices to monitor the mobility of the firefighters inside the crisis area by measuring the Received Signal Strength Indicator (RSSI) values received by these sensor motes strategically placed at different locations. We propose to develop a comprehensive location and monitoring system to be used by the firefighters while fighting fires. Our system would be ad-hoc, thus enabling it to be setup fairly quickly.","PeriodicalId":388309,"journal":{"name":"2013 Tenth International Conference on Wireless and Optical Communications Networks (WOCN)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115482606","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Image denoising using wavelet transform method 基于小波变换的图像去噪方法
Vikas Gupta, R. Mahle, Raviprakash S. Shriwas
{"title":"Image denoising using wavelet transform method","authors":"Vikas Gupta, R. Mahle, Raviprakash S. Shriwas","doi":"10.1109/WOCN.2013.6616235","DOIUrl":"https://doi.org/10.1109/WOCN.2013.6616235","url":null,"abstract":"Removing noise from the original signal is still a challenging job for researchers. There have been several numbers of published algorithms and each target to remove noise from original signal. This paper presents a result of some significant work in the area of image denoising it means we explore denoising of images using several thresholding methods such as SureShrink, VisuShrink and BayesShrink. Here we put results of different approaches of wavelet based image denoising methods. To find best method for image denoising is still a valid challenge at the crossing of functional analysis and statistics. Here we extend the existing technique and providing a comprehensive evaluation of the proposed method. Here the results based on various types of noise, such as Gaussian, Poisson's, Salt and Pepper, and Speckle performed in this paper. SNR (signal to noise ratio) and mean square error (MSE) are as a measure of the quality of denoising was preferred. Wavelet algorithms are very useful tool for signal processing such as image compression and image denoising. The main aim is to show the result of wavelet coefficients in the new basis, the noise can be minimize or removed from the data.","PeriodicalId":388309,"journal":{"name":"2013 Tenth International Conference on Wireless and Optical Communications Networks (WOCN)","volume":"108 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124821087","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 33
CMOS active inductor for low voltage and low power wireless applications 用于低电压和低功率无线应用的CMOS有源电感
V. Niranjan, A.Sai Kumar, S. B. Jain
{"title":"CMOS active inductor for low voltage and low power wireless applications","authors":"V. Niranjan, A.Sai Kumar, S. B. Jain","doi":"10.1109/WOCN.2013.6616190","DOIUrl":"https://doi.org/10.1109/WOCN.2013.6616190","url":null,"abstract":"The low-voltage design is an effective method to decrease power consumption in a circuit. In this paper, a compact CMOS active inductor circuit is proposed. The circuit is based on the gyrator-C approach with both transconductance stages realized by MOS transistors. The proposed inductor is suitable for low voltage operation as it has minimum number of transistors and none of them suffers from body effect. The dynamic body bias technique increases self resonant frequency of the inductor and offers low power dissipation. To validate the proposed circuit, simulation results are provided for 0.25 μm CMOS process at 1.2 V supply voltage.","PeriodicalId":388309,"journal":{"name":"2013 Tenth International Conference on Wireless and Optical Communications Networks (WOCN)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130032413","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
A novel defense scheme against DDOS attack in VANET 一种针对VANET网络DDOS攻击的新型防御方案
Ayonija Pathre, Chetan Agrawal, Anurag Jain
{"title":"A novel defense scheme against DDOS attack in VANET","authors":"Ayonija Pathre, Chetan Agrawal, Anurag Jain","doi":"10.1109/WOCN.2013.6616194","DOIUrl":"https://doi.org/10.1109/WOCN.2013.6616194","url":null,"abstract":"Vehicular ad hoc network (VANET) has extensively used to enhance protection of the passengers and reduce occasion of traffic congestion. Consistent communication in vehicular ad-hoc networks is important to provide functional and reliable traffic safety and efficiency applications. Security is the major issue in the network due to the mobile nature of the vehicle. In this paper we proposed the novel traffic congestion detection and removal scheme against DDOS attack Here the attacker behavior is broadcast the huge numbers of false information packets in network i.e. the false information about the traffic. The number of nodes or vehicles that receives the false packet information are affected from attack are called Node. Now if the traffic is jammed or congestion occurring and their information goes to Roadside Unit (RSU) then RSU must be detected and excluded permanently from the network after applying proposed effective approach. Proposed scheme against DDOS attack aims to identify and exclude attackers from the network. In the presence of misbehaving in network the false information is transferred in the network by that the vehicles are deciding to do the routing according to false information. Proposed security scheme recovers control information and improves the performance of VANET in the presence of an attacker.","PeriodicalId":388309,"journal":{"name":"2013 Tenth International Conference on Wireless and Optical Communications Networks (WOCN)","volume":"112 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127641262","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 36
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信