2013 Tenth International Conference on Wireless and Optical Communications Networks (WOCN)最新文献

筛选
英文 中文
Mobility models and performance of FISHEYE, LANMAR, OLSR and AODV FISHEYE、LANMAR、OLSR和AODV的迁移模型及性能
Deepak Kumar, Suresh C. Gupta
{"title":"Mobility models and performance of FISHEYE, LANMAR, OLSR and AODV","authors":"Deepak Kumar, Suresh C. Gupta","doi":"10.1109/WOCN.2013.6616237","DOIUrl":"https://doi.org/10.1109/WOCN.2013.6616237","url":null,"abstract":"A mobile ad hoc network (MANET) is an infrastructure less and self-configuring network of mobile devices which dynamically form a network without the help of any centralized administration. Frequently changing network topology needs efficient dynamic routing protocols. The performance of any routing protocol depends on the duration of interconnection among the nodes in the network for transferring the data. This interconnection results in an average connected path for whole network. The node mobility affects the number of average path as well as the performance of the routing protocols. A mobility model has an impact on the performance of Routing protocols. This paper aims to compare performance of some of the widely used routing protocols viz. FISHEYE, LANMAR, OLSR and AODV etc. for different mobility models viz. File Mobility model, Random Waypoint Mobility model and Group mobility Model.","PeriodicalId":388309,"journal":{"name":"2013 Tenth International Conference on Wireless and Optical Communications Networks (WOCN)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133144792","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Performance analysis of comb type pilot aided channel estimation in OFDM with different pilot sequences 不同导频序列下OFDM中梳型导频辅助信道估计的性能分析
Vaibhav Mishra, P. Tripathi, Pragati Rana, H. Joshi
{"title":"Performance analysis of comb type pilot aided channel estimation in OFDM with different pilot sequences","authors":"Vaibhav Mishra, P. Tripathi, Pragati Rana, H. Joshi","doi":"10.1109/WOCN.2013.6616197","DOIUrl":"https://doi.org/10.1109/WOCN.2013.6616197","url":null,"abstract":"Orthogonal Frequency Division Multiplexing (OFDM) is the wireless access technique which has become eminent in the field of research and has gained legendary importance due to its advantages. Channel estimation is one of the crucial characteristics for scrutinizing the performance of the OFDM systems. In this paper, firstly a characteristic of a Rayleigh fading channel is analyzed. Next, comb type pilot arrangement for channel estimation is used with different interpolation techniques for inspecting the channel response. The channel performance is also examined, using various pilot sequences like binary random sequence, hadamard sequence and complex sequence. Simulation results demonstrate that the use of different pilot sequences affect the channel performance, thereby leading to noble channel estimation practices.","PeriodicalId":388309,"journal":{"name":"2013 Tenth International Conference on Wireless and Optical Communications Networks (WOCN)","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116573271","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Effect of fault patterns on systems level diagnosis of mesh networks 故障模式对网状网络系统级诊断的影响
H. O. Srivastava, Suresh C. Gupta
{"title":"Effect of fault patterns on systems level diagnosis of mesh networks","authors":"H. O. Srivastava, Suresh C. Gupta","doi":"10.1109/WOCN.2013.6616236","DOIUrl":"https://doi.org/10.1109/WOCN.2013.6616236","url":null,"abstract":"Fault Diagnostics is one of the major requirements for assuring dependability of complex systems. In Systems level diagnostic procedures applied to computer interconnection networks, the processors diagnose each other and under certain conditions faulty processors can be identified. This paper simulates a system-level diagnosis algorithm for mesh with wraparound, topology to locate the faulty units in the system. It is observed that diagnosis cost varies with the number of faulty units, and also with the fault pattern. Also, simulation has been done for special fault patterns for which correct and complete diagnosis of the system cannot be done.","PeriodicalId":388309,"journal":{"name":"2013 Tenth International Conference on Wireless and Optical Communications Networks (WOCN)","volume":"83 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117258279","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Simulation and performance evaluation of energy efficient MAC protocols for wireless sensor networks 无线传感器网络节能MAC协议的仿真与性能评估
Deepak Simaiya, Utkarsh Sharma, Abhishek N. Tripathi
{"title":"Simulation and performance evaluation of energy efficient MAC protocols for wireless sensor networks","authors":"Deepak Simaiya, Utkarsh Sharma, Abhishek N. Tripathi","doi":"10.1109/WOCN.2013.6616241","DOIUrl":"https://doi.org/10.1109/WOCN.2013.6616241","url":null,"abstract":"In wireless sensor networks (WSNs), idle listening is one of the most significant sources of energy consumption. In order to limit this problem many synchronous and asynchronous approaches have been proposed. Synchronous approaches reduce the idle listening by sharing schedule information. Exchange of schedule information again results in extra overhead on energy consumption. Asynchronous approach (RI-MAC) uses receiver initiated beacon to do same. In this paper, we analyze and evaluate the performance of S-MAC and RI-MAC protocol for WSNs in two different scenarios namely Contending Flow and Data Gathering. Evaluation of these MAC protocols will be in terms of certain performance parameters, while considering energy consumption in overall period as well as in idle listening period as the major performance parameter.","PeriodicalId":388309,"journal":{"name":"2013 Tenth International Conference on Wireless and Optical Communications Networks (WOCN)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121479278","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Analysis of visibility and temperature patterns of Indian cities and it's clustering to identify the effect of presence of aerosol particles in the atmosphere 对印度城市的能见度和温度模式进行分析,并进行聚类,以确定大气中气溶胶颗粒存在的影响
Vijay Anand Sullare, A. Khan, B. Gour
{"title":"Analysis of visibility and temperature patterns of Indian cities and it's clustering to identify the effect of presence of aerosol particles in the atmosphere","authors":"Vijay Anand Sullare, A. Khan, B. Gour","doi":"10.1109/WOCN.2013.6616179","DOIUrl":"https://doi.org/10.1109/WOCN.2013.6616179","url":null,"abstract":"Variations in ambient air quality data are caused by changes in the pollutant emission rate, and meteorological and topographical conditions of the place. Mass concentration of aerosol is a measure of air quality and aerosol source strength at a particular location. It has been shown that clear sky visibility over land has decreased globally over the past 30 years, indicative of an increase in aerosols, or airborne particulates, over the world's continents during that time. The change in climatic conditions is of great concern in environment, industry and agriculture. The disturbance of temperature and other climate factors due to presence of aerosol particles in air, results in global climate changes. The aim of this research is to develop artificial neural network based clustering method for ambient atmospheric condition prediction in Indian city. Self-Organizing Map (SOM) Neural Network to divide data into four clusters which represents association in between atmospheric conditions belonging to cities of one cluster due to the amount of aerosol particles present in the atmosphere of those cities. The experimental results determined climate changes due to concentration of aerosol particles in the atmosphere of different cities in India and the correlation in between change in visibility and change in the temperature during the months of March to June.","PeriodicalId":388309,"journal":{"name":"2013 Tenth International Conference on Wireless and Optical Communications Networks (WOCN)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126622934","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Analysis of signature and signature free bufferoverflow detection for gif and jpg format gif和jpg格式的签名和签名自由缓冲区溢出检测分析
Pankaj B. Pawar, Pankaj K. Kawadkar, Malti Nagle, Padmashree Kunthe Ambare
{"title":"Analysis of signature and signature free bufferoverflow detection for gif and jpg format","authors":"Pankaj B. Pawar, Pankaj K. Kawadkar, Malti Nagle, Padmashree Kunthe Ambare","doi":"10.1109/WOCN.2013.6616181","DOIUrl":"https://doi.org/10.1109/WOCN.2013.6616181","url":null,"abstract":"Internet threat have different form of attacks, considering individual users to obtain control over data and network. The Buffer Overflow which is one of the most frequently occurring security vulnerabilities on network. Buffer Overflow occurs while writing data to a buffer and it overruns the buffer's threshold and overwrites it to neighboring memory. The techniques to avoid buffer overflow vulnerability vary per architecture, Operating system and memory region. The Signature based buffer overflow detection finds the particular Signature and if that found it blocks it to protect form malicious attack. The remaining request are consider for checking against the buffer size and grant to server if the buffer of request is less than or equal to defined threshold value of buffer. Signature free first filters and extracts instruction sequences from a request. Finally it compares the number of useful instructions to a threshold to determine if this instruction sequence contains code. Signature free thus it can block new and unknown buffer overflow attacks, Signature free is also immunized from most attack-side code obfuscation methods. Since Signature free is transparent to the servers that protected, it is efficient for economical Internet wide deployment with very low deployment and maintenance cost. We are proposing novel techniques for preventing buffer overflow during the transmission of images of different formats. In this paper we have discuss and evaluate certain tools and techniques which prevent buffer overflows. We have also discussed some modern tools and techniques with their pros and cons.","PeriodicalId":388309,"journal":{"name":"2013 Tenth International Conference on Wireless and Optical Communications Networks (WOCN)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116843950","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Design of U-shape microstrip patch antenna for WiMAX applications at 2.5 GHz 用于2.5 GHz WiMAX应用的u形微带贴片天线设计
Sanjeev Dwivedi, A. Rawat, R. Yadav
{"title":"Design of U-shape microstrip patch antenna for WiMAX applications at 2.5 GHz","authors":"Sanjeev Dwivedi, A. Rawat, R. Yadav","doi":"10.1109/WOCN.2013.6616214","DOIUrl":"https://doi.org/10.1109/WOCN.2013.6616214","url":null,"abstract":"The microstrip u-shape patch antennas are gaining attenuation in various WiMAX applications since last two decade. The u-shape Microstrip antenna has become a rapidly growing area of research with their potential application like mobiles and satellite communication. In this paper design of u-shape microstrip antennas is proposed at 2.5 GHz. It can be used in WiMAX communication systems. The objective of this paper is to analyze, design and validate rectangular u-shape microstrip patch antenna. The substrate material rogers RT/duroid 5880 with permittivity of 2.2 and dielectric loss tangent 0.0009 is selected for u-shape microstrip patch antenna design. The HFSS 13 based model is proposed to measured different bandwidths and gain for different dimensions.","PeriodicalId":388309,"journal":{"name":"2013 Tenth International Conference on Wireless and Optical Communications Networks (WOCN)","volume":"252 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123063355","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Information theft through covert channel by exploiting HTTP post method 利用HTTP post方法通过隐蔽通道窃取信息
Nishi Tomar, M. Gaur
{"title":"Information theft through covert channel by exploiting HTTP post method","authors":"Nishi Tomar, M. Gaur","doi":"10.1109/WOCN.2013.6616180","DOIUrl":"https://doi.org/10.1109/WOCN.2013.6616180","url":null,"abstract":"Covert channel is a known vulnerability in most of the network protocols that makes it possible for peers to communicate non-legitimately using known channels. This papers aims at demonstrating information theft scenario by means of covert channel in which it is used as a carrier for transmitting information that is stolen by exploiting HTTP Post method. The paper describes and demonstrates a mechanism of information theft through covert channel exploitation. Some potential countermeasure techniques are suggested on the basis of observed covert channels which is part of our future work.","PeriodicalId":388309,"journal":{"name":"2013 Tenth International Conference on Wireless and Optical Communications Networks (WOCN)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130084257","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Individual vs cooperative spectrum sensing for Cognitive Radio Networks 认知无线电网络的个体与合作频谱感知
Pulkit Sharma, V. Abrol
{"title":"Individual vs cooperative spectrum sensing for Cognitive Radio Networks","authors":"Pulkit Sharma, V. Abrol","doi":"10.1109/WOCN.2013.6616216","DOIUrl":"https://doi.org/10.1109/WOCN.2013.6616216","url":null,"abstract":"Cognitive Radio Networks provide a solution to the spectrum scarcity in wireless communication. It works on principle of dynamic spectrum management, which enables the secondary user to use the licensed spectrum of primary user opportunistically. To implement it we have to detect the absence of primary signal technically called detecting a spectrum hole. In this paper performance of both individual and cooperative spectrum sensing are evaluated under various parameters (like SNR, sensing time, number of users). Simulation results shows that cooperative spectrum sensing performs better than individual spectrum sensing.","PeriodicalId":388309,"journal":{"name":"2013 Tenth International Conference on Wireless and Optical Communications Networks (WOCN)","volume":"86 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128622103","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Wireless power transfer to underground sensors using resonant magnetic induction 无线电力传输到地下传感器使用谐振磁感应
K. A. Menon, Vippalapalli Vikas, B. Hariharan
{"title":"Wireless power transfer to underground sensors using resonant magnetic induction","authors":"K. A. Menon, Vippalapalli Vikas, B. Hariharan","doi":"10.1109/WOCN.2013.6616192","DOIUrl":"https://doi.org/10.1109/WOCN.2013.6616192","url":null,"abstract":"Wireless communication systems play an increasingly integral role in society. Currently underground sensor networks are used in many applications for security purposes, environmental applications, infrastructure maintenance etc. The major problem, associated with sensor networks, is in providing the power supply to enable the networks to work for long durations. This paper presents a novel technique to wirelessly, supply power to the underground sensor networks using the magnetic induction principle. In addition, using the resonating principle further ensures maximum efficiency of this proposed system. Experimental results to prove the feasibility of this novel technique for supplying wireless power are presented.","PeriodicalId":388309,"journal":{"name":"2013 Tenth International Conference on Wireless and Optical Communications Networks (WOCN)","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122475022","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信