2015 International Conference on Communication Networks (ICCN)最新文献

筛选
英文 中文
Association rules optimization using improved PSO algorithm 基于改进粒子群算法的关联规则优化
2015 International Conference on Communication Networks (ICCN) Pub Date : 2015-11-01 DOI: 10.1109/ICCN.2015.76
Mayank Agrawal, Manuj Mishra, S. Kushwah
{"title":"Association rules optimization using improved PSO algorithm","authors":"Mayank Agrawal, Manuj Mishra, S. Kushwah","doi":"10.1109/ICCN.2015.76","DOIUrl":"https://doi.org/10.1109/ICCN.2015.76","url":null,"abstract":"In this work, association rules are optimized by using improved particle swarm optimization algorithm (PSO Algorithm). Here improved PSO algorithm means classical PSO algorithm with additional operator in the forms of mutation of genetic algorithm. The basic shortcoming of PSO algorithm is to get trapped into local optima. So for improving this, mutation operator is used additionally in classical PSO algorithm. This operator is used after the initialization phase of PSO algorithm. Firstly, different association rules for generating frequent item sets are generated by standard Apriori algorithm, then improved PSO algorithm is applied on these generated association rules for optimizing them. Experiments are performed on different datasets taken from UCI machine learning repository and results are compared with other previously proposed algorithms, called KNN algorithm and ABC algorithm. These results show that the proposed algorithms efficiency is better than previously proposed algorithms.","PeriodicalId":431743,"journal":{"name":"2015 International Conference on Communication Networks (ICCN)","volume":"90 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127043835","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Enhanced multipath LEACH protocol for increasing network life time and minimizing overhead in MANET 增强的多路径LEACH协议,用于增加网络寿命和最小化MANET的开销
2015 International Conference on Communication Networks (ICCN) Pub Date : 2015-11-01 DOI: 10.1109/ICCN.2015.30
Priyanka Shakya, V. Sharma, Anil Saroliya
{"title":"Enhanced multipath LEACH protocol for increasing network life time and minimizing overhead in MANET","authors":"Priyanka Shakya, V. Sharma, Anil Saroliya","doi":"10.1109/ICCN.2015.30","DOIUrl":"https://doi.org/10.1109/ICCN.2015.30","url":null,"abstract":"Energy utilization is one of the important issues in MANET, efficient routing is necessary to utilize energy consumption and enhance the network performance. A mobile Ad hoc network (MANET) is autonomous, self-organizing and self-configuring network with the capability of rapid deployment in response to application needs. LEACH is an energy based protocol which works on the cluster base mechanism to utilize the energy consumption. The cluster formation is completely depends on the remaining energy of mobile nodes. The cluster has always having more energy than cluster members. In this paper we analyses the performance of LEACH protocol with reactive on demand multipath AOMDV protocol to efficiently utilize the energy constraint in network. Here proposed scheme are not compare with any previous existing scheme. The performance of proposed MAX energy based LEACH-AOMDV is compared with normal LEACH-AOMDV routing and observes that the energy utilization is more in proposed LEACH. In Our experiments show that nodes have at best imprecise state information, especially under high traffic rates. LEACH generates cluster and gives information about energy of each cluster belonging to zone and if energy of the node is higher so LEACH selects that particular node for data transmission that increases the reliable communication. In this paper we also analyse the result in the form of network parameter like throughput, packet delivery ratio, energy consumption via node and routing overhead.","PeriodicalId":431743,"journal":{"name":"2015 International Conference on Communication Networks (ICCN)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116674867","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Modified region based segmentation of medical images 改进的基于区域的医学图像分割方法
2015 International Conference on Communication Networks (ICCN) Pub Date : 2015-11-01 DOI: 10.1109/ICCN.2015.41
R. Kashyap, Pratima Gautam
{"title":"Modified region based segmentation of medical images","authors":"R. Kashyap, Pratima Gautam","doi":"10.1109/ICCN.2015.41","DOIUrl":"https://doi.org/10.1109/ICCN.2015.41","url":null,"abstract":"Health care applications became boon for the healthcare industry. It needs correct segmentation connected with medical images regarding correct diagnosis. This assures good quality segmentation of healthcare images victimization. The Level set method (LSM) can be a capable technique however quick process employing correct segments is still difficult. The region based model does inadequately for intensity irregularity images. With this cardstock, we have a whole new tendency to propose a better region based level set method of which integrates the altered signed pressure function because of the geodesic active contour models plus the Mumford-Shah model. So as to eliminate the re-initialization procedure for ancient level set model and removes the computationally costly re-initialization. A compared employing ancient model, our model is more durable against images employing weak edge and intensity irregularity. The novelty within our method is to help you locally compute improved Signed pressure function (SPF), which uses neighborhood mean values which enables it to detect boundaries within the homogenous places. Compared with other active design models proposed method derives valuable advantages not stuck just using quick process, automation and correct medical image segments. This method offers undergone numerous analysis tests to prove its importance in medical image segmentation.","PeriodicalId":431743,"journal":{"name":"2015 International Conference on Communication Networks (ICCN)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127736064","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 23
Robust FinFET based highly noise immune power gated SRAM circuit design 基于鲁棒FinFET的高抗噪功率门控SRAM电路设计
2015 International Conference on Communication Networks (ICCN) Pub Date : 2015-11-01 DOI: 10.1109/ICCN.2015.59
N. Bhardwaj, V. Mahor, M. Pattanaik
{"title":"Robust FinFET based highly noise immune power gated SRAM circuit design","authors":"N. Bhardwaj, V. Mahor, M. Pattanaik","doi":"10.1109/ICCN.2015.59","DOIUrl":"https://doi.org/10.1109/ICCN.2015.59","url":null,"abstract":"Leakage power dissipation, timing delay and high noise immunity in advanced embedded static random access memories cells are main critical issues in low power battery operated devices. The newly proposed FinFET based highly noise immune Power gated 6T SRAM design is targeting these areas and successfully suppress leakage power dissipation with maintaining stability of data in standby mode. A single ended read and write assist circuitry is also presented to here, which enhancing read and write noise margin for maintaining robustness of SRAM stability. As compared with conventional FinFET SRAM designs in the proposed design, the power dissipation in SLEEP mode is reduced up to 86.8% and, read and write power consumption are up to 98.9% and 16.5%, respectively. The noise margin of proposed design is increased up to 45× as compared to self-reverse biased power gated SRAM at 32nm technology node.","PeriodicalId":431743,"journal":{"name":"2015 International Conference on Communication Networks (ICCN)","volume":"373 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131852714","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Using Geo-location method for lost node in location based services 基于地理位置的服务中丢失节点的地理定位方法
2015 International Conference on Communication Networks (ICCN) Pub Date : 2015-11-01 DOI: 10.1109/ICCN.2015.68
Brinda Shivhare, Gaurav Sharma, R. S. Kushwah, S. Kushwah
{"title":"Using Geo-location method for lost node in location based services","authors":"Brinda Shivhare, Gaurav Sharma, R. S. Kushwah, S. Kushwah","doi":"10.1109/ICCN.2015.68","DOIUrl":"https://doi.org/10.1109/ICCN.2015.68","url":null,"abstract":"The “geo-location” or “location-based services” is an authentication driven system that gives a strong layer in field of lost node localization and that limits the access of information content to specified locations or times with respective to lost node. Yet, the difficulty arises with the GPS related services makes it impractical to incorporate GPS in all the mobile nodes (MN) and subject to availability of GPS signals. The physical location of a particular user or network node at any instant in time is uniquely characterized by a location signature with trace its exact location. These location signature obtain from location node, where several analyst have described how the use of location information can make approach more secured. According to our empirical study the approach can meet the confidentiality, substantiate, clarity, accessibility and practicability of localization of lost node issues in Geo-location authentication systems.","PeriodicalId":431743,"journal":{"name":"2015 International Conference on Communication Networks (ICCN)","volume":"81 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117243045","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A survey: Lightweight cryptography in WSN 无线传感器网络中的轻量级加密技术综述
2015 International Conference on Communication Networks (ICCN) Pub Date : 2015-11-01 DOI: 10.1109/ICCN.2015.3
S. T. Patel, N. Mistry
{"title":"A survey: Lightweight cryptography in WSN","authors":"S. T. Patel, N. Mistry","doi":"10.1109/ICCN.2015.3","DOIUrl":"https://doi.org/10.1109/ICCN.2015.3","url":null,"abstract":"A Wireless Sensor Network (WSN) is a wireless network which contains small sensor nodes to monitor physical or environmental conditions. When WSNs are deployed in inaccessible areas, the probability of occurring different types of attacks is very high. So the security of WSN becomes extremely important. As sensors have limited processing power, limited storage, low bandwidth, and energy; traditional security measures designed for the resource-rich networks such as LAN etc. are not suitable for the resource-constrained WSN. In presence of such limitations it becomes mandatory to devise lightweight security solutions for data transmission in WSNs. Because of problems in public key cryptography such as costly key computation, longer keys, key vulnerability to brute force attack, key distribution and maintenance, etc., it is not preferred for WSN. The less computation and low memory requirements of symmetric key cryptography with very short length of key (lightweight) justifies its use in WSN to achieve information security. Hence, this paper aims to study, discuss and analyze the Lightweight Cryptographic Algorithms Suitable for Wireless Sensor Networks.","PeriodicalId":431743,"journal":{"name":"2015 International Conference on Communication Networks (ICCN)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125163106","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Optimization of cooperative spectrum sensing in cognitive radio for mobile communication 移动通信认知无线电协同频谱感知优化
2015 International Conference on Communication Networks (ICCN) Pub Date : 2015-11-01 DOI: 10.1109/ICCN.2015.46
Divyesh R. Keraliya, Ashalata Kulshrestha, S. Patel
{"title":"Optimization of cooperative spectrum sensing in cognitive radio for mobile communication","authors":"Divyesh R. Keraliya, Ashalata Kulshrestha, S. Patel","doi":"10.1109/ICCN.2015.46","DOIUrl":"https://doi.org/10.1109/ICCN.2015.46","url":null,"abstract":"Cognitive radio technology offers a revolutionary solution to spectral resources crisis by looking at the spectrum in an unconventional manner as a multi-dimensional space. The current wireless communication systems are governed by fixed spectrum assignment policy (licensed spectrum), which was proven by measurement to be inefficient. Cognitive radio enables maximum spectrum utilization efficiency through opportunistic access to temporarily unutilized portions of spectrum. In Cognitive Radio spectrum sensing performance is more important. By cooperative spectrum sensing probability of false alarm (Pf) is increased with given probability of detection (Pd). In this paper we formulate a cooperative spectrum sensing as noncooperative game and also formulate a optimization problem, numerical results demonstrate that limited number of SU for cooperative sensing are achieve much better performance than Nash Equilibrium. By selecting optimal strategy SU maximize their utility, maximum spectrum utilization is depend on expected utility under different SNR.","PeriodicalId":431743,"journal":{"name":"2015 International Conference on Communication Networks (ICCN)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124363112","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Design and analysis of a 5-pole interdigital band-pass filter at 2.4GHz 2.4GHz五极数字间带通滤波器的设计与分析
2015 International Conference on Communication Networks (ICCN) Pub Date : 2015-11-01 DOI: 10.1109/ICCN.2015.19
Atul Makrariya, P. Khare
{"title":"Design and analysis of a 5-pole interdigital band-pass filter at 2.4GHz","authors":"Atul Makrariya, P. Khare","doi":"10.1109/ICCN.2015.19","DOIUrl":"https://doi.org/10.1109/ICCN.2015.19","url":null,"abstract":"In this paper we have designed and analyzed the transmission character of a 5-pole symmetrical interdigital band-pass filter centered at a frequency of 2.4GHz. Interdigital band-pass filter is designed on FR4 substrate with a substrate thickness of 1.6mm and dielectric constant, εr = 4.4. Interdigital Band pass filter is designed and simulated by Finite Element Method (FEM) based commercial software Ansoft's HFSS v13. Various transmission characteristics of band-pass filter like Fractional Bandwidth (FBW), coupling, group delay, etc., are discussed. A FBW of 59.6% is obtained at a center frequency of 2.4GHz.","PeriodicalId":431743,"journal":{"name":"2015 International Conference on Communication Networks (ICCN)","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116824166","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
MITE: Memory integrity based trust evaluation in Wireless Sensor Networks 基于内存完整性的无线传感器网络信任评估
2015 International Conference on Communication Networks (ICCN) Pub Date : 2015-11-01 DOI: 10.1109/ICCN.2015.40
S. Desai, M. Nene
{"title":"MITE: Memory integrity based trust evaluation in Wireless Sensor Networks","authors":"S. Desai, M. Nene","doi":"10.1109/ICCN.2015.40","DOIUrl":"https://doi.org/10.1109/ICCN.2015.40","url":null,"abstract":"Trust is quintessential to safety in a network and is the epitome of security. Trust management schemes have been researched and implemented in Wireless Sensor Networks (WSNs) to provide an added advantage over and above the cryptographic security mechanisms. Each trust management scheme deals with the concept of trust and its evaluation in a unique manner. This uniqueness in approach is achieved by using network parameters, QoS, behavior of nodes etc. as metrics to evaluate trust. Every trust management scheme aims at providing resilience to the effect of malicious or selfish nodes. In this paper, we propose a node memory based trust evaluation method by using memory integrity as a metric to evaluate trust. The results indicate the method to be promising to evaluate trust at node-level and network-level.","PeriodicalId":431743,"journal":{"name":"2015 International Conference on Communication Networks (ICCN)","volume":"472 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133486871","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Design and deployment of Vehicle Tracking System in VANETs using Xbee Pro: Prototype model 基于Xbee Pro的VANETs车辆跟踪系统的设计与部署:原型模型
2015 International Conference on Communication Networks (ICCN) Pub Date : 2015-11-01 DOI: 10.1109/ICCN.2015.20
Nagarjuna Karyemsetty, B. Samatha, K. H. Rao
{"title":"Design and deployment of Vehicle Tracking System in VANETs using Xbee Pro: Prototype model","authors":"Nagarjuna Karyemsetty, B. Samatha, K. H. Rao","doi":"10.1109/ICCN.2015.20","DOIUrl":"https://doi.org/10.1109/ICCN.2015.20","url":null,"abstract":"Cooperative and Communication applications place an vital role in vehicular adhoc network(VANET)s for safety messages, warning messages, weather information, Traffic congestion information and road conditions information etc can be communicated from one vehicle node to another vehicle node and vehicle node to road side unit (RSU) within the ITS (Intelligent Transportation Systems). In this paper, we conducted an experimental study to establish a simple network among five vehicle nodes. Design of each vehicle node composed of communication module, Processing module, GPS module and energy source. Each vehicle node transmits its position information along with speed of the vehicle to RSU in which we can trace the movements of vehicle that mean we can monitor the travel path of vehicle in Google map using latitude and longitude transmitted by GPS Receiver. Experiment results proved that the degradation of network performance using zigbee module in dynamic and high speed environment.","PeriodicalId":431743,"journal":{"name":"2015 International Conference on Communication Networks (ICCN)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122948037","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信