Proceedings of the 2015 Third International Conference on Computer, Communication, Control and Information Technology (C3IT)最新文献

筛选
英文 中文
Design of fuzzy based intelligent energy efficient routing protocol for WANET 基于模糊的WANET智能节能路由协议设计
S. Das, S. Tripathi, A. P. Burnwal
{"title":"Design of fuzzy based intelligent energy efficient routing protocol for WANET","authors":"S. Das, S. Tripathi, A. P. Burnwal","doi":"10.1109/C3IT.2015.7060201","DOIUrl":"https://doi.org/10.1109/C3IT.2015.7060201","url":null,"abstract":"Wireless ad-hoc networks (WANET) have recently emerged as a premier research topic due to its infrastructure-less and dynamic natures. Topologies of this network can changes very frequently due to its dynamic nature. The node of this network fitted with limited capacity battery which is major problem in real-time operation. The present paper proposes a routing protocol; named Fuzzy based Intelligent Energy Efficient Routing protocol (FIE2R) for WANET. The entire operation of FIE2R is handle by decision maker which divide the entire process into two phases first is WANET graph initiation phase that helps to find out reward of each route into second phase. Based on the comprehensive simulation of FIE2R using MATLAB and NS2 and comparative study of same with other existing protocols, it is observed that proposed routing protocol contributes to the performance improvements in terms of energy efficiency.","PeriodicalId":402311,"journal":{"name":"Proceedings of the 2015 Third International Conference on Computer, Communication, Control and Information Technology (C3IT)","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-03-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117139765","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 30
Anonymity preserving secure hash function based authentication scheme for consumer USB mass storage device 基于匿名安全哈希函数的消费类USB大容量存储设备认证方案
Ruhul Amin, G. P. Biswas
{"title":"Anonymity preserving secure hash function based authentication scheme for consumer USB mass storage device","authors":"Ruhul Amin, G. P. Biswas","doi":"10.1109/C3IT.2015.7060190","DOIUrl":"https://doi.org/10.1109/C3IT.2015.7060190","url":null,"abstract":"A USB (Universal Serial Bus) mass storage device, which makes a (USB) device accessible to a host computing device and enables file transfers after completing mutual authentication between the authentication server and the user. It is also very popular device because of it's portability, large storage capacity and high transmission speed. To protect the privacy of a file transferred to a storage device, several security protocols have been proposed but none of them is completely free from security weaknesses. Recently He et al. proposed a multi-factor based security protocol which is efficient but the protocol is not applicable for practical implementation, as they does not provide password change procedure which is an essential phase in any password based user authentication and key agreement protocol. As the computation and implementation of the cryptographic one-way hash function is more trouble-free than other existing cryptographic algorithms, we proposed a light weight and anonymity preserving three factor user authentication and key agreement protocol for consumer mass storage devices and analyzes our proposed protocol using BAN logic. Furthermore, we have presented informal security analysis of the proposed protocol and confirmed that the protocol is completely free from security weaknesses and applicable for practical implementation.","PeriodicalId":402311,"journal":{"name":"Proceedings of the 2015 Third International Conference on Computer, Communication, Control and Information Technology (C3IT)","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-03-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127021655","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
LMMSE equalized DCSK communication system over a multipath fading channel with AWGN noise LMMSE均衡了多径衰落信道中存在AWGN噪声的DCSK通信系统
Sandip Das, Soumitra Kr Mandal, Moitrayee Chakraborty
{"title":"LMMSE equalized DCSK communication system over a multipath fading channel with AWGN noise","authors":"Sandip Das, Soumitra Kr Mandal, Moitrayee Chakraborty","doi":"10.1109/C3IT.2015.7060167","DOIUrl":"https://doi.org/10.1109/C3IT.2015.7060167","url":null,"abstract":"The advances in the development of chaos based communication system suggests that chaos shift keying (CSK) and its variant Differential CSK (DCSK) are one of the most promising candidates for practical implementation. In this paper a DCSK communication system incorporating a non coherent approach of demodulation based on a correlation detector is considered over a multipath fading channel. Specifically, it can be anticipated that the channel will introduce attenuation and cause distortion in the transmitted sequence due to fading and multipath. This distortion will cause Intersymbol interference (ISI) and will also add noise. Channel equalizers are capable of removing ISI from the transmitted sequence and also noise. In this paper the performance of a linear MMSE channel equalizer is analysed for a DCSK communication system over a multipath fading channel with additive white Gaussian noise.","PeriodicalId":402311,"journal":{"name":"Proceedings of the 2015 Third International Conference on Computer, Communication, Control and Information Technology (C3IT)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-03-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124240869","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A model based solar insolation utiliser for socio economic development 一种用于社会经济发展的基于模型的太阳能集热器
Sandip Das, S. Mazumdar
{"title":"A model based solar insolation utiliser for socio economic development","authors":"Sandip Das, S. Mazumdar","doi":"10.1109/C3IT.2015.7060159","DOIUrl":"https://doi.org/10.1109/C3IT.2015.7060159","url":null,"abstract":"Human socio economic developments depends upon working as well as living conditions. And no productive work can be done efficiently without proper illumination level. For maximum utilization of man power through all the days, arrangement of artificial lighting is essential. Being a developing nation, India still has challenges to provide conventional energy utilities to the interior of rural areas. While as a tropical country of Latitude: 21.7679° N, Longitude: 78.8718° E, it has a plenty of solar insolation as 5.10 kWh/m2/day as per 22-year average for the parameters for sizing and pointing of solar panels [1]. Employing this prospects, a novel strategy can be proposed to arrange artificial lighting incorporating a solar insolation utilizer. A novel model based prototype solar insolation utilizer has been proposed to amalgam artificial lighting essentiality for socio economic development with plenty of solar insolation as tropical country. The prototype model has been tested figuring expected outcomes of illumination level.","PeriodicalId":402311,"journal":{"name":"Proceedings of the 2015 Third International Conference on Computer, Communication, Control and Information Technology (C3IT)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-03-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129865058","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A compact suspended planar patch antenna for microwave imaging sensor array 一种用于微波成像传感器阵列的小型悬浮平面贴片天线
S. B. Belamgi, S. Ray
{"title":"A compact suspended planar patch antenna for microwave imaging sensor array","authors":"S. B. Belamgi, S. Ray","doi":"10.1109/C3IT.2015.7060225","DOIUrl":"https://doi.org/10.1109/C3IT.2015.7060225","url":null,"abstract":"A compact suspended planar patch antenna is presented for microwave imaging sensor array designed at ISM Band. The radiating patch of the compact suspended antenna is placed at a height of 5mm considering air dielectric substrate (εr = 1.001). The antenna is fed by a coaxial probe and single shorting post is placed in its lower left corner of radiating edge. More compactness is achieved by cutting a single rectangular slot at one of the radiating edges of the patch antenna, resulting in an area reduction factor of approximately equal to 20. Compact suspended planar patch antenna design equations are validated by experimental data and data obtained using MoM based EM simulator (IE3D). The proposed antenna provides resonant frequency 2.45 GHz, impedance bandwidth 3.22%, S11 of-33 dB, gain of 3.9 dBi, and directivity 4.43 dBi with a high radiation efficiency of 88.7%. It is needed for microwave imaging sensor arrays. Simulated and fabricated planar patch antenna has achieved compact design by 95% size reduction compared to a conventional suspended planar patch antenna.","PeriodicalId":402311,"journal":{"name":"Proceedings of the 2015 Third International Conference on Computer, Communication, Control and Information Technology (C3IT)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-03-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131844473","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Test scenario modeling: Modeling test scenarios diagrammatically using specification based testing techniques 测试场景建模:使用基于规范的测试技术对测试场景进行图表化建模
Robin Tommy, Nikita Prasannakumaran, K. V. Sumithra, S. Kesav
{"title":"Test scenario modeling: Modeling test scenarios diagrammatically using specification based testing techniques","authors":"Robin Tommy, Nikita Prasannakumaran, K. V. Sumithra, S. Kesav","doi":"10.1109/C3IT.2015.7060198","DOIUrl":"https://doi.org/10.1109/C3IT.2015.7060198","url":null,"abstract":"Software testing is a challenging task involving evaluation of the software to demonstrate that it meets the requirements and also to provide stakeholders with information about the quality of the application under test. Scenario testing is done to make sure that the end to end functioning of software is working fine, or all the business process flows of the software are working fine. However exhaustive testing of any software application is not possible because of (a) large number of input data combinations or (b) large number of possible paths in software. The popular Model Based Testing approach uses a Unified Modeling Language (UML) model of the system under test to auto generate test cases with good coverage. However UML is a modeling language used in software development. This paper introduces an innovative idea of using test scenario modeling diagrams representing black box testing techniques for test scenario modeling to ensure better coverage and traceability to requirements. These test scenario modeling diagrams, presented as an alternative to UML, will help test executives interpret Quality Assurance (QA) mappings and Test Scenario overview capturing. Also the diagrams introduced help the test planning and control activities by providing more in-depth connectivity to the technical aspects and business risks.","PeriodicalId":402311,"journal":{"name":"Proceedings of the 2015 Third International Conference on Computer, Communication, Control and Information Technology (C3IT)","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-03-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134585146","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Enhancing security of one-time password using Elliptic Curve Cryptography with biometrics for e-commerce applications 利用椭圆曲线密码及生物识别技术加强电子商务应用的一次性密码安全性
Dindayal Mahto, D. Yadav
{"title":"Enhancing security of one-time password using Elliptic Curve Cryptography with biometrics for e-commerce applications","authors":"Dindayal Mahto, D. Yadav","doi":"10.1109/C3IT.2015.7060172","DOIUrl":"https://doi.org/10.1109/C3IT.2015.7060172","url":null,"abstract":"Security of one-time password (OTP) is essential because nowadays most of the e-commerce transactions are performed with the help of this mechanism. OTP is used to counter replay attack/eavesdropping. Replay attack or eavesdropping is one type of attacks on network-connected computing environment or isolated computing environment. For achieving 112 bits of security level, Rivest Shamir and Adleman (RSA) algorithm needs key size of 2048 bits, while Elliptic Curve Cryptography (ECC) needs key size of 224-255 bits. Another issue with most of the existing implementation of security models is storage of secret keys. Cryptographic keys are often kept in en-secured way that can either be guessed/social-engineered or obtained through brute force attacks. This becomes a weak link and leads integrity issues of sensitive data in a security model. To overcome the above problem, biometrics is combined with cryptography for developing strong security model. This paper suggests an enhanced security model of OTP system using ECC with palm-vein biometrie. This model also suggests better security with lesser key size than other prevalent public key crypto-model. The cryptographic keys are also not required to memorize or keep anywhere, these keys are generated as and when needed.","PeriodicalId":402311,"journal":{"name":"Proceedings of the 2015 Third International Conference on Computer, Communication, Control and Information Technology (C3IT)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-03-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133833131","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
Calculating intersubband transition energy in T-shaped quantum wire using FD technique 利用FD技术计算t型量子线的子带间跃迁能量
A. Deyasi, S. Bhattacharyya, N. Das
{"title":"Calculating intersubband transition energy in T-shaped quantum wire using FD technique","authors":"A. Deyasi, S. Bhattacharyya, N. Das","doi":"10.1109/C3IT.2015.7060118","DOIUrl":"https://doi.org/10.1109/C3IT.2015.7060118","url":null,"abstract":"Eigenstates and intersubband transition energies of a T-shaped quantum wire embedded in square quantum wire are numerically computed by solving time-independent Schrödinger equation using finite difference technique. Dimensions of arm well and stem wells and material composition of shell layer is varied to observe the change in transition energies. AlxGa1-xAs/GaAs composition is considered for simulation purpose with appropriate boundary conditions, arises due to geometrical nature and effective mass mismatch at heterojunction along with conduction band discontinuity. Transition energy is plotted for lowest three eigenstates. Results establish that T-shaped structure is one of the promising candidates for quantum wire laser.","PeriodicalId":402311,"journal":{"name":"Proceedings of the 2015 Third International Conference on Computer, Communication, Control and Information Technology (C3IT)","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-03-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127066461","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An efficient Ray-triangle intersection algorithm for tunnel models 隧道模型中一种有效的射线-三角形交点算法
Fengyu Gao, Hongyan Qian
{"title":"An efficient Ray-triangle intersection algorithm for tunnel models","authors":"Fengyu Gao, Hongyan Qian","doi":"10.1109/C3IT.2015.7060163","DOIUrl":"https://doi.org/10.1109/C3IT.2015.7060163","url":null,"abstract":"Ray-triangle intersection is an important operation in algorithms like ray tracing. Meanwhile, it is often the most time-consuming operation especially when there are a lot of triangles in the scene. In this paper, we proposed an efficient ray-triangle intersection algorithm for tunnel models. Its time complexity per ray is O(√n) with a very small coefficient, where n is the number of triangles in the tunnel model. Experiment results show that the algorithm outperforms many other spacial subdivision schemes like the regular grid and the kd-tree in a lot of cases. Another advantage of this algorithm is that its preprocessing is only related to the shape of the tunnel's cross section, which can be performed only once. As a result, plenty of time can be saved when users have to construct a lot of models with different parameters.","PeriodicalId":402311,"journal":{"name":"Proceedings of the 2015 Third International Conference on Computer, Communication, Control and Information Technology (C3IT)","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-03-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131124426","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Implementation of a smart map using spatial oracle 利用空间oracle实现智能地图
Subhas Barman, Ajitesh Kr Barman, Bapi Panda, Pintu Sharma
{"title":"Implementation of a smart map using spatial oracle","authors":"Subhas Barman, Ajitesh Kr Barman, Bapi Panda, Pintu Sharma","doi":"10.1109/C3IT.2015.7060183","DOIUrl":"https://doi.org/10.1109/C3IT.2015.7060183","url":null,"abstract":"Geographical Information Systems (GIS) are special types of information systems managing geo-spatial data. The GIS is used to manage geo-referenced information and it represents spatial position of any location into digital map. The GIS also facilitates the user to retrieve spatial information easily using a lot of geographic functions such as data integration, mapping, and overlaying, buffering, projection etc. In the traditional GIS, layer wise data extraction is difficult as it is not followed layerwise data storing. In this regard, our system is able to extract spatial data layer wise from database according to the user's interest. It is also able to work with both spatial data and attribute data (non-spatial data). Spatial data describes the locations and shapes of geographic features like roads, buildings and streets while attribute data describes the characteristics of geographic features (like name, type etc.). In this paper, we present an approach to implement a map of a town considering the layers (road, building like administrative office, health center, educational organization etc.) using spatial database and map-viewer.","PeriodicalId":402311,"journal":{"name":"Proceedings of the 2015 Third International Conference on Computer, Communication, Control and Information Technology (C3IT)","volume":"294 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-03-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134010579","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信