2012 Second International Conference on Advanced Computing & Communication Technologies最新文献

筛选
英文 中文
BER Analysis of Incoherent SAC-OCDMA System Using ZVCC in a Noisy Environment 噪声环境下基于ZVCC的非相干SAC-OCDMA系统误码率分析
S. Sharma, Preeti
{"title":"BER Analysis of Incoherent SAC-OCDMA System Using ZVCC in a Noisy Environment","authors":"S. Sharma, Preeti","doi":"10.1109/ACCT.2012.35","DOIUrl":"https://doi.org/10.1109/ACCT.2012.35","url":null,"abstract":"In this paper the performance of Incoherent SAC OCDMA system has been evaluated in a noisy environment using ZVCC (Zero Vector Combinatorial Code set). CDMA system allows multiple users to access the channel simultaneously but is limited by some problems like MAI (multiple access interference), PIIN (Phase induced intensity noise), thermal noise, and shot noise still exists in this system. It is observed from the results that as effective power is increased, the intensity noise becomes the main factor of performance degradation of the system.","PeriodicalId":396313,"journal":{"name":"2012 Second International Conference on Advanced Computing & Communication Technologies","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-03-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116826237","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Energy Efficient Data Tranfer in Secure Wireless Sensor Networks 安全无线传感器网络中的节能数据传输
Madhu, A. Dahiya, B. Dahiya
{"title":"Energy Efficient Data Tranfer in Secure Wireless Sensor Networks","authors":"Madhu, A. Dahiya, B. Dahiya","doi":"10.1109/ACCT.2012.49","DOIUrl":"https://doi.org/10.1109/ACCT.2012.49","url":null,"abstract":"Wireless sensor networks are a new type of networked systems, characterized by severely constrained computational and energy resources, and an ad hoc operational environment. Wireless sensor networks(WSNs) have been increasingly available for large-scale applications in which energy efficiency & security is an important performance measure. Driven by the energy & security limitation nature of WSNs lots of research works have been done in aspects such as nodes replication, data aggregation routing, security moniroting etc. In this paper we first study the flooding algorithm and then remove limitation of flooding algorithm using grid network. Then we propose a Horizontal -- Vertical method for load balancing of the grid network.","PeriodicalId":396313,"journal":{"name":"2012 Second International Conference on Advanced Computing & Communication Technologies","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-01-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125182586","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Design and Analysis of Hollow Star Shape Fractal Antenna 空心星形分形天线的设计与分析
P. Bansal, S. Tayal
{"title":"Design and Analysis of Hollow Star Shape Fractal Antenna","authors":"P. Bansal, S. Tayal","doi":"10.1109/ACCT.2012.42","DOIUrl":"https://doi.org/10.1109/ACCT.2012.42","url":null,"abstract":"Fractals have very unique property of self similarity which differentiates itself from other kind of antennas. This property provides multiple usages in the Multi-band and broad-band antennas design and application. However this uniqueness of Fractals is determined and governed by it's geometrical design. In this paper, 20GHz multi band antenna is created by applying fractal geometry to a hollow Star shape and choosing appropriate size and location for feeding. Simulation is performed via IE3D software. Results of simulation show that suggested antenna is Multi-band because it is operational in 2-20GHz frequency range.","PeriodicalId":396313,"journal":{"name":"2012 Second International Conference on Advanced Computing & Communication Technologies","volume":"278 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-01-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122835357","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Simulation and Optimal Design of a Monofliar Helix Antenna for 1420 MHz 1420mhz单片螺旋天线的仿真与优化设计
T. Sharma
{"title":"Simulation and Optimal Design of a Monofliar Helix Antenna for 1420 MHz","authors":"T. Sharma","doi":"10.1109/ACCT.2012.103","DOIUrl":"https://doi.org/10.1109/ACCT.2012.103","url":null,"abstract":"The paper addresses simulation and fabrication technique to optimize a monofliar Helix antenna. A conducting wire in form of screw threads forms a Helix. Helix antenna is used in the field of space sciences due to its high directivity and gain. This paper optimizes the performance of a monofliar Helix antenna which is used as a feed at a frequency of 1420 MHz to study hydrogen line spectrum. This antenna can be used as a feed at frequency of 1420MHz. The theoretical simulations of helix are carried out using Numerical Electromagnetic Code, Version 2 software which is numeric code based on method of moments. Helix antenna is fabricated and optimized to a beam width ranging from 70-80°. Radiation properties, including far-field patterns, gain, axial ratio, VSWR, return loss are computed for frequency of 1420 MHz. All theoretical studies of helix antenna are carried out using NEC-2 (Numerical Electromagnetic Code, Version 2.0) software, which is a numerical code based on the method of moments. The measurements conducted in paper were limited to far-field patterns only. The helix with low fabrication cost makes this antenna very attractive to mobile and satellite communications and aerospace applications.","PeriodicalId":396313,"journal":{"name":"2012 Second International Conference on Advanced Computing & Communication Technologies","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-01-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128533267","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Novel CMOS Low Noise Amplifier for UWB Application 一种用于超宽带的新型CMOS低噪声放大器
P. Manikandan, A. S. Areeckal
{"title":"A Novel CMOS Low Noise Amplifier for UWB Application","authors":"P. Manikandan, A. S. Areeckal","doi":"10.1109/ACCT.2012.8","DOIUrl":"https://doi.org/10.1109/ACCT.2012.8","url":null,"abstract":"This paper presents the design of a CMOS variable gain low noise amplifier used for ultra wideband applications. A current reuse technique is applied to the resistive feedback amplifier to widen the gain tuning range. A common source amplifier is cascoded to achieve high gain and gain controllability. The LNA is designed to operate at 1.4V supply voltage and is implemented in TSMC 0.18μm CMOS technology. The power gain of the LNA is 22±5 dB and the noise figure varies from 3.5 to 4.8 within the bandwidth from 3 to 9 GHz. The power gain (S21) is obtained more than 10dB and the reverse isolation (S12) is below-22dB.","PeriodicalId":396313,"journal":{"name":"2012 Second International Conference on Advanced Computing & Communication Technologies","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-01-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128554916","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Security Protocols in MANETs manet中的安全协议
S. Kumar, G. Pruthi, A. Yadav, M. Singla
{"title":"Security Protocols in MANETs","authors":"S. Kumar, G. Pruthi, A. Yadav, M. Singla","doi":"10.1109/ACCT.2012.101","DOIUrl":"https://doi.org/10.1109/ACCT.2012.101","url":null,"abstract":"Mobile ad-hoc network (MANET) is one of the recent active fields and has received marvelous attention. MANET is a collection of mobile nodes having the capability of forming temporarily network without the aid of any established infrastructure or centralized administration. Due to the self-configuration and self maintenance capabilities, MANETs become more vulnerable. So, Security challenges have become a primary concern to provide secure communication between mobile nodes. Many techniques have been developed to identify different type of network attacks. In this paper, we study the major attack types that MANET faces and the security goals to be achieved. This paper gives out a brief survey of major security protocols with their relative comparison.","PeriodicalId":396313,"journal":{"name":"2012 Second International Conference on Advanced Computing & Communication Technologies","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-01-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129051851","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
De-noising Filters for TEM (Transmission Electron Microscopy) Image of Nanomaterials 纳米材料透射电子显微镜图像的去噪滤波器
H. S. Kushwaha, S. Tanwar, K. Rathore, S. Srivastava
{"title":"De-noising Filters for TEM (Transmission Electron Microscopy) Image of Nanomaterials","authors":"H. S. Kushwaha, S. Tanwar, K. Rathore, S. Srivastava","doi":"10.1109/ACCT.2012.41","DOIUrl":"https://doi.org/10.1109/ACCT.2012.41","url":null,"abstract":"TEM (Transmission Electron Microscopy) is an important morphological characterization tool for Nano-materials. Quite often a microscopy image gets corrupted by noise, which may arise in the process of acquiring the image, or during its transmission, or even during reproduction of the image. Removal of noise from an image is one of the most important tasks in image processing. Depending on the nature of the noise, such as additive or multiplicative type of noise, there are several approaches towards removing noise from an image. Image De-noising improves the quality of images acquired by optical, electro-optical or electronic microscopy. There are conventional methods like inverse filtering, Wiener filtering, Kalman filtering, Algebraic approach, etc., to restore the original object. The research paper aimed at describing &, comparing the usage of different types of filters namely Average Filter, Median Filter, and Wiener Filter for filtering amplifier noise present in a TEM Image of Nanomaterials. These filters are designed using a linear filtering Algorithm based on the sources of noise, pixel and the background of Image which depends on the substrate and Material present on TEM sample Grid.","PeriodicalId":396313,"journal":{"name":"2012 Second International Conference on Advanced Computing & Communication Technologies","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-01-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127676101","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 24
Analysis and Modelling of Websites Quality Using Fuzzy Technique 网站质量的模糊分析与建模
H. Mittal, Monika Sharma, Jai P. Mittal
{"title":"Analysis and Modelling of Websites Quality Using Fuzzy Technique","authors":"H. Mittal, Monika Sharma, Jai P. Mittal","doi":"10.1109/ACCT.2012.25","DOIUrl":"https://doi.org/10.1109/ACCT.2012.25","url":null,"abstract":"The quality of websites is evaluated on the basis of eleven important metrics load time, response time, mark-up validation, broken link, accessibility error, size, page rank, frequency of update, traffic and design optimisation. The metrics are taken as linguistic variables. Fuzzy logic is used to evaluate grade of a website.","PeriodicalId":396313,"journal":{"name":"2012 Second International Conference on Advanced Computing & Communication Technologies","volume":"AES-23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-01-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126555041","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Analysis and Design of a Reliable Packet Transfer Mechanism for WIMAX WIMAX可靠分组传输机制的分析与设计
M. Sain, H. M. Rai
{"title":"Analysis and Design of a Reliable Packet Transfer Mechanism for WIMAX","authors":"M. Sain, H. M. Rai","doi":"10.1109/ACCT.2012.24","DOIUrl":"https://doi.org/10.1109/ACCT.2012.24","url":null,"abstract":"Today is the world of mobile and wireless communication. With the increase of its use there are some problems still under research regarding WIMAX. One of such major problem is the security. Security is always the main issue for any network and with the wireless network it requires more concern. This work is also presented in the same area. We are presenting our work regarding the liability of the data on the arrival side. This data can be a voice or some digital data. Over the network the Active attacks are very common. The proposed approach will provide a reliable packet marking in such network. We are proposing the probabilistic packet marking with the inclusion of four other approaches. i) A Definite Randomize packet marking approach to decide the transmission path. ii) An approach to trace back the path to identify the visited route. iii) A combination of Context based and Dictionary based encoding approach to verify the transmitted data. iv) A Checksum will be applied to vary the alteration of data. The proposed system will result more reliable transmission on WIMAX.","PeriodicalId":396313,"journal":{"name":"2012 Second International Conference on Advanced Computing & Communication Technologies","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-01-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132574268","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
An Efficient Method of Risk Assessment Using Intelligent Agents 一种基于智能代理的风险评估方法
Dr. R. Selvarani, M. Lorenz, Jan D. Gehrke, Hagen Langer, I. Timm, J. Hammer
{"title":"An Efficient Method of Risk Assessment Using Intelligent Agents","authors":"Dr. R. Selvarani, M. Lorenz, Jan D. Gehrke, Hagen Langer, I. Timm, J. Hammer","doi":"10.1109/ACCT.2012.19","DOIUrl":"https://doi.org/10.1109/ACCT.2012.19","url":null,"abstract":"Risk assessment is one of the most important tasks in software development. It can absorb a significant amount of project planning effort. Some tools like CASE (Computer-aided Software Engineering) tools support particular phases of the project cycle while others can be used with a specific software development model or technology. There is a need for risk assessment and management since risk management is done throughout the lifecycle of a project. In this paper, the risk assessment problem is addressed using one of the effective methods known as intelligent agents' method.","PeriodicalId":396313,"journal":{"name":"2012 Second International Conference on Advanced Computing & Communication Technologies","volume":"631 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-01-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116180394","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信